A flaw was found in keystone's chained delegation. A trustee able to create a delegation from a trust or an OAuth token could misuse identity impersonation to bypass the enforced scope, possibly allowing them to obtain elevated privileges to the trustor's projects and roles.
Find out more about CVE-2014-3476 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 4.9 |
---|---|
Base Metrics | AV:N/AC:M/Au:S/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 3.0 (openstack-keystone) | RHSA-2014:0994 | 2014-07-31 |
Red Hat Enterprise Linux OpenStack Platform 4.0 (openstack-keystone) | RHSA-2014:0994 | 2014-07-31 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | openstack-keystone | Affected |