4.9 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
6.1 Medium
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
65.2%
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.
github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa
github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355
github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626
github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d
github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454
github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de
secunia.com/advisories/50045
secunia.com/advisories/50494
www.openwall.com/lists/oss-security/2012/07/27/4
www.ubuntu.com/usn/USN-1552-1
bugs.launchpad.net/keystone/+bug/996595
bugs.launchpad.net/keystone/+bug/997194
bugs.launchpad.net/keystone/+bug/998185
launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz