Show filters
63 Total Results
Displaying 11-20 of 63
Sort by:
Attacker Value
Unknown
CVE-2020-36405
Disclosure Date: July 01, 2021 (last updated November 28, 2024)
Keystone Engine 0.9.2 has a use-after-free in llvm_ks::X86Operand::getToken.
0
Attacker Value
Unknown
CVE-2021-32624
Disclosure Date: May 24, 2021 (last updated November 28, 2024)
Keystone 5 is an open source CMS platform to build Node.js applications. This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. No patches exist at this time. There are no workarounds at this time
0
Attacker Value
Unknown
CVE-2020-12691
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
0
Attacker Value
Unknown
CVE-2020-12689
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
0
Attacker Value
Unknown
CVE-2020-12692
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
0
Attacker Value
Unknown
CVE-2020-12690
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.
0
Attacker Value
Unknown
keystone_json_assignment backend granted access to any project for users in use…
Disclosure Date: January 17, 2020 (last updated February 21, 2025)
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
0
Attacker Value
Unknown
CVE-2013-2166
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
0
Attacker Value
Unknown
CVE-2013-2167
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
0
Attacker Value
Unknown
CVE-2019-19687
Disclosure Date: December 09, 2019 (last updated November 27, 2024)
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
0