ossa/ossa/OSSA-2013-014.yaml

67 lines
1.5 KiB
YAML

date: 2013-05-28
id: OSSA-2013-014
title: 'Missing expiration check in Keystone PKI tokens validation'
description: 'Eoghan Glynn from Red Hat and Alex Meade from Rackspace both reported
a vulnerability in expiry checks for PKI tokens in the Keystone authentication middleware.
Expired tokens for authenticated users could continue to be used, potentially resulting
in the bypass of intended security policies. The effect of PKI token revocation
is also reversed when the token expires, in the sense that a revoked token is once
again treated as being valid. Only setups using PKI tokens are affected.'
reference: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000106.html
affected-products:
- product: keystone
version: Folsom
- product: python-keystoneclient
version: Versions after 0.2.0
vulnerabilities:
- cve-id: CVE-2013-2104
impact-assessment:
source: 'Red Hat Product Security'
rating: moderate
assessment:
type: CVSS2
score: 2.6
detail: AV:N/AC:H/Au:N/C:N/I:P/A:N
classification:
source: 'Red Hat Product Security'
type: CWE
detail: TODO
reporters:
- name: 'Eoghan Glynn'
affiliation: 'Red Hat'
reported:
- CVE-2013-2104
- name: 'Alex Meade'
affiliation: Rackspace
reported:
- CVE-2013-2104
issues:
links:
- https://launchpad.net/bugs/1179615
type: launchpad
reviews:
python-keystone-0.2.4:
- https://review.openstack.org/#/c/30742
folsom:
- https://review.openstack.org/#/c/30743
type: gerrit