OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html | vendor advisory mailing list third party advisory |
http://secunia.com/advisories/59547 | third party advisory |
http://www.securityfocus.com/bid/68026 | third party advisory vdb entry |
https://bugs.launchpad.net/keystone/+bug/1324592 | third party advisory issue tracking exploit |
http://secunia.com/advisories/57886 | third party advisory |
http://www.openwall.com/lists/oss-security/2014/06/12/3 | patch mailing list third party advisory |