An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://security.openstack.org/ossa/OSSA-2020-003.html | vendor advisory |
https://bugs.launchpad.net/keystone/+bug/1872737 | third party advisory |
https://www.openwall.com/lists/oss-security/2020/05/06/4 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/05/07/1 | third party advisory mailing list |
https://usn.ubuntu.com/4480-1/ | third party advisory vendor advisory |