CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
EPSS
Percentile
61.9%
The catalog url replacement in OpenStack Identity (Keystone) before
2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to
read sensitive configuration options via a crafted endpoint, as
demonstrated by “$(admin_token)” in the publicurl endpoint field.
Author | Note |
---|---|
jdstrand | 12.04 is affected. Create test service and malicious endpoint as per the bug, then do (assumes ‘testadmin’ is in the ‘admin’ project (use tenant id from `keystone tenant-list |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | keystone | < 1:2014.1.3-0ubuntu1 | UNKNOWN |
ubuntu | 14.10 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |
ubuntu | 15.04 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |
ubuntu | 15.10 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |
ubuntu | 16.04 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |
ubuntu | 16.10 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |
ubuntu | 17.04 | noarch | keystone | < 1:2014.2~rc1-0ubuntu1 | UNKNOWN |