Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openstack keystone - vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2014-5252
The V3 API in OpenStack Identity (Keystone) 2014.1.x prior to 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request ...
Openstack Keystone 2014.1.2
Openstack Keystone Juno-2
Openstack Keystone 2014.1
Canonical Ubuntu Linux 14.04
Openstack Keystone Juno-1
4.9
CVSSv2
CVE-2014-5253
OpenStack Identity (Keystone) 2014.1.x prior to 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.
Openstack Keystone 2014.1.2
Canonical Ubuntu Linux 14.04
Openstack Keystone Juno-1
Openstack Keystone Juno-2
Openstack Keystone 2014.1
4.9
CVSSv2
CVE-2014-5251
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x prior to 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expi...
Openstack Keystone Juno-2
Openstack Keystone 2014.1
Canonical Ubuntu Linux 14.04
Openstack Keystone Juno-1
Openstack Keystone 2014.1.2
5
CVSSv2
CVE-2013-2014
OpenStack Identity (Keystone) prior to 2013.1 allows remote malicious users to cause a denial of service (memory consumption and crash) via multiple long requests.
Openstack Keystone
Fedoraproject Fedora 19
6
CVSSv2
CVE-2014-0105
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) prior to 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large num...
Openstack Python-keystoneclient 0.2.3
Openstack Python-keystoneclient 0.2.2
Openstack Python-keystoneclient 0.3.0
Openstack Python-keystoneclient 0.3.1
Openstack Python-keystoneclient 0.3.2
Openstack Python-keystoneclient
Openstack Python-keystoneclient 0.2.4
7.8
CVSSv2
CVE-2014-2828
The V3 API in OpenStack Identity (Keystone) 2013.1 prior to 2013.2.4 and icehouse before icehouse-rc2 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining....
Openstack Keystone 2013.1.2
Openstack Keystone 2013.2
Openstack Keystone 2013.2.3
Openstack Keystone 2013.2.2
Openstack Keystone 2013.1.1
Openstack Keystone 2013.1
Openstack Keystone 2013.1.3
Openstack Keystone 2013.2.1
2.1
CVSSv2
CVE-2013-2030
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/key...
Openstack Compute 2013.1.2
Openstack Compute 2013.1.3
Openstack Havana Havana-1
Openstack Havana Havana-2
Openstack Havana Havana-3
Openstack Grizzly 2013.1
Openstack Compute 2013.1
Openstack Compute 2013.1.1
Openstack Folsom -
2.1
CVSSv2
CVE-2013-2013
The user-password-update command in python-keystoneclient prior to 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
Openstack Python-keystoneclient
Openstack Python-keystoneclient 0.2.2
4.3
CVSSv2
CVE-2013-2157
OpenStack Keystone Folsom, Grizzly prior to 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote malicious users to bypass authentication via an empty password.
Openstack Keystone
6
CVSSv2
CVE-2013-2059
OpenStack Identity (Keystone) Folsom 2012.2.4 and previous versions, Grizzly prior to 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token...
Openstack Keystone 2012.1
Openstack Keystone 2013.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »