Skip to content

OpenStack Identity Keystone Improper Privilege Management

Moderate severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated May 14, 2024

Package

pip keystone (pip)

Affected versions

< 8.0.0a0

Patched versions

8.0.0a0

Description

OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID.

References

Published by the National Vulnerability Database Nov 3, 2014
Published to the GitHub Advisory Database May 13, 2022
Reviewed May 14, 2024
Last updated May 14, 2024

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(57th percentile)

Weaknesses

Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Learn more on MITRE.

CVE ID

CVE-2014-0204

GHSA ID

GHSA-c4p9-87h3-7vr4

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.