ossa/ossa/OSSA-2013-011.yaml

64 lines
1.5 KiB
YAML

date: 2013-05-09
id: OSSA-2013-011
title: 'Keystone tokens not immediately invalidated when user is deleted'
description: 'Sam Stoelinga reported a vulnerability in Keystone. When users are deleted
through Keystone v2 API, existing tokens for those users are not immediately invalidated
and remain valid for the duration of the token''s life (by default, up to 24 hours).
This may result in users retaining access when the administrator of the system thought
them disabled. You can workaround this issue by disabling a user before deleting
it: in that case the tokens belonging to the disabled user are immediately invalidated.
Keystone setups using the v3 API call to delete users are unaffected.'
reference: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000099.html
affected-products:
- product: keystone
version: All versions
vulnerabilities:
- cve-id: CVE-2013-2059
impact-assessment:
source: 'Red Hat Product Security'
rating: moderate
assessment:
type: CVSS2
score: 4.0
detail: AV:N/AC:L/Au:S/C:N/I:P/A:N
classification:
source: 'Red Hat Product Security'
type: CWE
detail: TODO
reporters:
- name: 'Sam Stoelinga'
affiliation: UNKNOWN
reported:
- CVE-2013-2059
issues:
links:
- https://launchpad.net/bugs/1166670
type: launchpad
reviews:
havana:
- https://review.openstack.org/#/c/28677
grizzly:
- https://review.openstack.org/#/c/28678
folsom:
- https://review.openstack.org/#/c/28679
type: gerrit