Grzegorz Grasza e15e33fe9b Fix privilege escalation via spoofed identity headers
The external_oauth2_token middleware did not sanitize incoming
authentication headers before processing OAuth 2.0 tokens. This
allowed an attacker to send forged identity headers (e.g.,
X-Is-Admin-Project, X-Roles, X-User-Id) that would not be cleared
by the middleware, potentially enabling privilege escalation.

This fix adds a call to remove_auth_headers() at the start of
request processing to sanitize all incoming identity headers,
matching the secure behavior of the main auth_token middleware.

Closes-Bug: #2129018
Change-Id: Idd4fe1d17a25b3064b31f454d9830242f345e018
Signed-off-by: Jeremy Stanley <fungi@yuggoth.org>
Signed-off-by: Artem Goncharov <artem.goncharov@gmail.com>
2026-01-15 18:31:49 +01:00
2017-10-02 21:57:27 -05:00
2019-04-19 19:35:58 +00:00
2017-10-02 21:57:27 -05:00
2017-07-20 16:38:16 +08:00
2014-06-19 15:45:29 -07:00
2019-09-18 14:47:21 +08:00
2017-04-06 22:03:25 +00:00
2025-10-02 16:56:59 +00:00
2025-10-03 01:02:47 +09:00

Team and repository tags

image

Middleware for the OpenStack Identity API (Keystone)

Latest Version

Downloads

This package contains middleware modules designed to provide authentication and authorization features to web services other than Keystone <https://github.com/openstack/keystone>. The most prominent module is keystonemiddleware.auth_token. This package does not expose any CLI or Python API features.

For information on contributing, see CONTRIBUTING.rst.

For any other information, refer to the parent project, Keystone:

https://github.com/openstack/keystone

Description
OpenStack Identity (Keystone) Middleware
Readme 14 MiB
Languages
Python 100%