In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2543 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:2533 | vendor advisory |
http://www.openwall.com/lists/oss-security/2018/07/25/2 | mailing list third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:2523 | vendor advisory |
http://www.securityfocus.com/bid/104930 | vdb entry third party advisory |
https://www.debian.org/security/2018/dsa-4275 | third party advisory vendor advisory |