Openstack

Keystone

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 00:00:00
  • Zuletzt bearbeitet 04.05.2026 18:25:50

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attack...

  • EPSS 0.02%
  • Veröffentlicht 14.04.2026 20:05:03
  • Zuletzt bearbeitet 17.04.2026 15:38:09

In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only ...

  • EPSS 0.03%
  • Veröffentlicht 10.04.2026 03:16:02
  • Zuletzt bearbeitet 13.04.2026 15:02:06

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API...

  • EPSS 0.03%
  • Veröffentlicht 17.11.2025 00:00:00
  • Zuletzt bearbeitet 15.04.2026 00:35:42

OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 01.09.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:01:00

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain a...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 26.08.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:51

A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to da...

Exploit
  • EPSS 0.74%
  • Veröffentlicht 06.08.2021 21:15:06
  • Zuletzt bearbeitet 21.11.2024 06:16:30

OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to a...

  • EPSS 0.82%
  • Veröffentlicht 07.05.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:04

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role...

  • EPSS 1.07%
  • Veröffentlicht 07.05.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:04

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the u...

  • EPSS 3.57%
  • Veröffentlicht 07.05.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:04

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and projec...