- EPSS 0.47%
- Published 12.04.2013 22:55:01
- Last modified 11.04.2025 00:51:21
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass acc...
- EPSS 1.81%
- Published 12.04.2013 22:55:01
- Last modified 11.04.2025 00:51:21
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.
- EPSS 2.96%
- Published 24.02.2013 19:55:01
- Last modified 11.04.2025 00:51:21
OpenStack Keystone Essex 2012.1.3 and earlier, Folsom 2012.2.3 and earlier, and Grizzly grizzly-2 and earlier allows remote attackers to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generation of...
CVE-2012-5483
- EPSS 0.11%
- Published 26.12.2012 22:55:03
- Last modified 11.04.2025 00:51:21
tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading...
- EPSS 0.56%
- Published 09.10.2012 15:55:01
- Last modified 11.04.2025 00:51:21
OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.
CVE-2012-4456
- EPSS 3.95%
- Published 09.10.2012 15:55:01
- Last modified 11.04.2025 00:51:21
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete...
- EPSS 0.43%
- Published 18.09.2012 17:55:07
- Last modified 11.04.2025 00:51:21
OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.
CVE-2012-3426
- EPSS 0.21%
- Published 31.07.2012 10:45:42
- Last modified 11.04.2025 00:51:21
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating n...