5.5.0
12 years ago
6 months ago
Known vulnerabilities in the python-keystoneclient package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
python-keystoneclient is a client for the OpenStack Identity API, implemented by the Keystone team; it contains a Python API (the Affected versions of this package are vulnerable to Access Restriction Bypass keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. How to fix Access Restriction Bypass? Upgrade | [,0.2.4) |
python-keystoneclient is a client for the OpenStack Identity API, implemented by the Keystone team; it contains a Python API (the Affected versions of this package are vulnerable to Inadequate Encryption Strength. It has middleware How to fix Inadequate Encryption Strength? Upgrade | [0.2.3,0.3.0) |
python-keystoneclient is a client for the OpenStack Identity API, implemented by the Keystone team; it contains a Python API (the Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity due to middleware memcache signing bypass. How to fix Insufficient Verification of Data Authenticity? Upgrade | [0.2.3,0.3.0) |
Affected versions of The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. How to fix Man-in-the-Middle (MitM)? Upgrade | [,1.4.0) |
How to fix Information Exposure? Upgrade to version | [,0.2.4) |
How to fix Access Restriction Bypass? Upgrade to version | [,0.7.0) |
Affected versions of this package vulnerable to Authentication Bypass. python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. | [,0.2.4) |