OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2013/03/20/13 | mailing list |
http://secunia.com/advisories/52657 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-04/msg00000.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101719.html | vendor advisory |
https://bugs.launchpad.net/keystone/+bug/1129713 | |
https://review.openstack.org/#/c/24906/ | |
http://www.securityfocus.com/bid/58616 | vdb entry |
http://www.ubuntu.com/usn/USN-1772-1 | vendor advisory |
http://osvdb.org/91532 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2013-0708.html | vendor advisory |