Openstack

Keystone

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.47%
  • Veröffentlicht 12.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass acc...

  • EPSS 1.81%
  • Veröffentlicht 12.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.

  • EPSS 2.96%
  • Veröffentlicht 24.02.2013 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone Essex 2012.1.3 and earlier, Folsom 2012.2.3 and earlier, and Grizzly grizzly-2 and earlier allows remote attackers to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generation of...

  • EPSS 0.11%
  • Veröffentlicht 26.12.2012 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading...

  • EPSS 0.56%
  • Veröffentlicht 09.10.2012 15:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.

  • EPSS 3.95%
  • Veröffentlicht 09.10.2012 15:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete...

  • EPSS 0.43%
  • Veröffentlicht 18.09.2012 17:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 31.07.2012 10:45:42
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating n...