python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html | Release Notes Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0992.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/06/19/5 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/60680 | Third Party Advisory VDB Entry |
https://access.redhat.com/security/cve/cve-2013-2167 | Third Party Advisory |
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167 | Not Applicable |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167 | Issue Tracking Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85492 | Third Party Advisory VDB Entry |
https://security-tracker.debian.org/tracker/CVE-2013-2167 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-12-10 15:15
Updated : 2023-02-13 04:43
NVD link : CVE-2013-2167
Mitre link : CVE-2013-2167
CVE.ORG link : CVE-2013-2167
JSON object : View
Products Affected
redhat
- openstack
debian
- debian_linux
openstack
- python-keystoneclient
CWE
CWE-345
Insufficient Verification of Data Authenticity