Skip to content

OpenStack Identity Keystone is vulnerable to Block delegation escalation of privilege

Moderate severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated May 14, 2024

Package

pip keystone (pip)

Affected versions

< 8.0.0a0

Patched versions

8.0.0a0

Description

OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.

References

Published by the National Vulnerability Database Jun 17, 2014
Published to the GitHub Advisory Database May 13, 2022
Reviewed May 14, 2024
Last updated May 14, 2024

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(76th percentile)

Weaknesses

Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Learn more on MITRE.

CVE ID

CVE-2014-3476

GHSA ID

GHSA-274v-r947-v34r

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.