ossa/OSSA-2013-014.json

49 lines
1.6 KiB
JSON

{
"advisory": {
"date": "2013-05-28",
"description": "Eoghan Glynn from Red Hat and Alex Meade from Rackspace both reported a vulnerability in expiry checks for PKI tokens in the Keystone authentication middleware. Expired tokens for authenticated users could continue to be used, potentially resulting in the bypass of intended security policies. The effect of PKI token revocation is also reversed when the token expires, in the sense that a revoked token is once again treated as being valid. Only setups using PKI tokens are affected.",
"id": "2013-014",
"title": "Missing expiration check in Keystone PKI tokens validation",
"url": "http://lists.openstack.org/pipermail/openstack-announce/2013-May/000106.html"
},
"affects": [
{
"product": "keystone",
"version": "TODO"
},
{
"product": "python-keystoneclient",
"version": "TODO"
}
],
"bugs": [
"1179615"
],
"notes": "",
"reporters": [
{
"company": "Red Hat",
"name": "Eoghan Glynn"
},
{
"company": "Rackspace",
"name": "Alex Meade"
}
],
"reviews": [
"30742",
"30743"
],
"schema_version": 1,
"vulnerabilities": [
{
"cve": "CVE-2013-2104",
"cvss": {
"base_score": "2.6",
"scoring_vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
},
"cwe": "TODO",
"impact": "moderate"
}
]
}