The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2705-1 | third party advisory vendor advisory |
http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html | mailing list vendor advisory |
https://bugs.launchpad.net/keystonemiddleware/+bug/1411063 | |
http://rhn.redhat.com/errata/RHSA-2015-1685.html | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | |
http://www.securityfocus.com/bid/74187 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2015-1677.html | vendor advisory |