62af610079
Prepare for repository publication by: - moving all YAML under ossa/ - cargo-culting doc building from openstack/governance - adding a LICENSE (CC 3.0 BY) Change-Id: I68354a7b75060ed5012e16048e40ffb61007ff9d
67 lines
1.5 KiB
YAML
67 lines
1.5 KiB
YAML
date: 2013-05-28
|
|
|
|
id: OSSA-2013-014
|
|
|
|
title: 'Missing expiration check in Keystone PKI tokens validation'
|
|
|
|
description: 'Eoghan Glynn from Red Hat and Alex Meade from Rackspace both reported
|
|
a vulnerability in expiry checks for PKI tokens in the Keystone authentication middleware.
|
|
Expired tokens for authenticated users could continue to be used, potentially resulting
|
|
in the bypass of intended security policies. The effect of PKI token revocation
|
|
is also reversed when the token expires, in the sense that a revoked token is once
|
|
again treated as being valid. Only setups using PKI tokens are affected.'
|
|
|
|
reference: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000106.html
|
|
|
|
affected-products:
|
|
|
|
- product: keystone
|
|
version: Folsom
|
|
|
|
- product: python-keystoneclient
|
|
version: Versions after 0.2.0
|
|
|
|
vulnerabilities:
|
|
|
|
- cve-id: CVE-2013-2104
|
|
impact-assessment:
|
|
source: 'Red Hat Product Security'
|
|
rating: moderate
|
|
assessment:
|
|
type: CVSS2
|
|
score: 2.6
|
|
detail: AV:N/AC:H/Au:N/C:N/I:P/A:N
|
|
classification:
|
|
source: 'Red Hat Product Security'
|
|
type: CWE
|
|
detail: TODO
|
|
|
|
reporters:
|
|
|
|
- name: 'Eoghan Glynn'
|
|
affiliation: 'Red Hat'
|
|
reported:
|
|
- CVE-2013-2104
|
|
|
|
- name: 'Alex Meade'
|
|
affiliation: Rackspace
|
|
reported:
|
|
- CVE-2013-2104
|
|
|
|
issues:
|
|
|
|
links:
|
|
- https://launchpad.net/bugs/1179615
|
|
|
|
type: launchpad
|
|
|
|
reviews:
|
|
|
|
python-keystone-0.2.4:
|
|
- https://review.openstack.org/#/c/30742
|
|
|
|
folsom:
|
|
- https://review.openstack.org/#/c/30743
|
|
|
|
type: gerrit
|