Improper Certificate Validation The advisory has been revoked - it doesn't affect any version of package python-keystoneclient  (opens in a new tab)


Threat Intelligence

EPSS
0.26% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-PYTHONKEYSTONECLIENT-6421654
  • published11 Mar 2024
  • disclosed6 Aug 2014

Introduced: 6 Aug 2014

CVE-2014-7144  (opens in a new tab)
CWE-295  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:7.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-keystoneclient package and not the python-keystoneclient package as distributed by RHEL.

OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.