Openstack

Keystone

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.43%
  • Veröffentlicht 02.10.2014 14:55:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the pub...

  • EPSS 0.31%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.

  • EPSS 0.29%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification ...

  • EPSS 0.31%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users ...

Exploit
  • EPSS 0.72%
  • Veröffentlicht 17.06.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with im...

  • EPSS 2.37%
  • Veröffentlicht 02.06.2014 15:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests.

  • EPSS 0.86%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authent...

  • EPSS 0.19%
  • Veröffentlicht 01.04.2014 06:35:53
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-i...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 14.12.2013 17:21:46
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from ...

  • EPSS 0.58%
  • Veröffentlicht 30.09.2013 22:55:04
  • Zuletzt bearbeitet 29.04.2026 01:13:23

OpenStack Identity (Keystone) Folsom, Grizzly 2013.1.3 and earlier, and Havana before havana-3 does not properly revoke user tokens when a tenant is disabled, which allows remote authenticated users to retain access via the token.