CVE-2012-5571
Published Dec 18, 2012
Last updated 7 years ago
Overview
- Description
- OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5FDB43F-B315-4F68-9D86-B644F2D4DF9A" }, { "criteria": "cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E76B76AB-D744-4163-8615-7BA18ABB1347" } ], "operator": "OR" } ] } ]