64 lines
1.5 KiB
YAML
64 lines
1.5 KiB
YAML
date: 2013-05-09
|
|
|
|
id: OSSA-2013-011
|
|
|
|
title: 'Keystone tokens not immediately invalidated when user is deleted'
|
|
|
|
description: 'Sam Stoelinga reported a vulnerability in Keystone. When users are deleted
|
|
through Keystone v2 API, existing tokens for those users are not immediately invalidated
|
|
and remain valid for the duration of the token''s life (by default, up to 24 hours).
|
|
This may result in users retaining access when the administrator of the system thought
|
|
them disabled. You can workaround this issue by disabling a user before deleting
|
|
|
|
it: in that case the tokens belonging to the disabled user are immediately invalidated.
|
|
Keystone setups using the v3 API call to delete users are unaffected.'
|
|
|
|
reference: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000099.html
|
|
|
|
affected-products:
|
|
|
|
- product: keystone
|
|
version: All versions
|
|
|
|
vulnerabilities:
|
|
|
|
- cve-id: CVE-2013-2059
|
|
impact-assessment:
|
|
source: 'Red Hat Product Security'
|
|
rating: moderate
|
|
assessment:
|
|
type: CVSS2
|
|
score: 4.0
|
|
detail: AV:N/AC:L/Au:S/C:N/I:P/A:N
|
|
classification:
|
|
source: 'Red Hat Product Security'
|
|
type: CWE
|
|
detail: TODO
|
|
|
|
reporters:
|
|
|
|
- name: 'Sam Stoelinga'
|
|
affiliation: UNKNOWN
|
|
reported:
|
|
- CVE-2013-2059
|
|
|
|
issues:
|
|
|
|
links:
|
|
- https://launchpad.net/bugs/1166670
|
|
|
|
type: launchpad
|
|
|
|
reviews:
|
|
|
|
havana:
|
|
- https://review.openstack.org/#/c/28677
|
|
|
|
grizzly:
|
|
- https://review.openstack.org/#/c/28678
|
|
|
|
folsom:
|
|
- https://review.openstack.org/#/c/28679
|
|
|
|
type: gerrit
|