ID CVE-2014-0105
Summary The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."
References
Vulnerable Configurations
  • cpe:2.3:a:openstack:python-keystoneclient:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openstack:python-keystoneclient:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:openstack:python-keystoneclient:0.4.2:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 16-12-2017 - 02:29)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2014:0382
  • rhsa
    id RHSA-2014:0409
rpms
  • python-keystoneclient-1:0.7.1-2.el6ost
  • python-keystoneclient-doc-1:0.7.1-2.el6ost
  • python-six-0:1.5.2-1.el6
  • python-keystoneclient-1:0.7.1-2.el6ost
  • python-keystoneclient-doc-1:0.7.1-2.el6ost
  • python-six-0:1.5.2-1.el6
  • python-keystoneclient-1:0.2.3-8.el6ost
  • python-keystoneclient-doc-1:0.2.3-8.el6ost
refmap via4
confirm https://bugs.launchpad.net/python-keystoneclient/+bug/1282865
mlist [oss-security] 20140327 [OSSA 2014-007] Potential context confusion in Keystone middleware (CVE-2014-0105)
Last major update 16-12-2017 - 02:29
Published 15-04-2014 - 14:55
Last modified 16-12-2017 - 02:29
Back to Top