- Description
- The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 4.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:N
- nvd@nist.gov
- CWE-255
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openstack:keystone:2014.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D1D0FFC2-E748-4611-AB1A-EAF6F49F4212"
},
{
"criteria": "cpe:2.3:a:openstack:keystone:2014.1.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "10944579-0B9C-4493-86E0-F537EA97DA1D"
},
{
"criteria": "cpe:2.3:a:openstack:keystone:juno-1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1776BC45-43E1-4EE3-B444-4DAA8D514B2B"
},
{
"criteria": "cpe:2.3:a:openstack:keystone:juno-2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7C7DB928-BC40-452F-8BB1-E06D438ACBD5"
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
}
],
"operator": "OR"
}
]
}
]