Access Restriction Bypass Affecting keystone package, versions <2012.1.1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-KEYSTONE-400026
  • published31 Jul 2012
  • disclosed31 Jul 2012

Introduced: 31 Jul 2012

CVE-2012-3426  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:9 keystone to version 2012.1.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream keystone package and not the keystone package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.

CVSS Scores

version 3.1