The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
http://www.securityfocus.com/bid/80498 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/keystone/+bug/1490804 | Issue Tracking Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2016-005.html | Patch Vendor Advisory |
https://wiki.openstack.org/wiki/OSSN/OSSN-0062 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-02-03 18:59
Updated : 2020-06-02 18:57
NVD link : CVE-2015-7546
Mitre link : CVE-2015-7546
CVE.ORG link : CVE-2015-7546
JSON object : View
Products Affected
openstack
- keystone
- keystonemiddleware
oracle
- solaris
CWE
CWE-522
Insufficiently Protected Credentials