5
CVSSv2

CVE-2013-0282

Published: 12/04/2013 Updated: 16/11/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

OpenStack Keystone Grizzly prior to 2013.1, Folsom 2012.1.3 and previous versions, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent malicious users to bypass access restrictions.

Vulnerable Product Search on Vulmon Subscribe to Product

openstack keystone 2013.1

openstack keystone

Vendor Advisories

Synopsis Moderate: openstack-keystone security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated openstack-keystone packages that fix multiple security issues,various bugs, and add enhancements are now available for Red Hat OpenStackFolsomThe Red Hat Security Response ...
Keystone could be made to crash or expose sensitive information over the network ...
Debian Bug report logs - #700948 keystone: CVE-2013-1664 (DoS in xml entitiy parsing) and CVE-2013-1665 (nformation leak via xml entity parsing) Package: keystone; Maintainer for keystone is Debian OpenStack <team+openstack@trackerdebianorg>; Source for keystone is src:keystone (PTS, buildd, popcon) Reported by: Thomas Goi ...
Debian Bug report logs - #700947 CVE-2013-0282: Ensure EC2 users and tenant are enabled Package: keystone; Maintainer for keystone is Debian OpenStack <team+openstack@trackerdebianorg>; Source for keystone is src:keystone (PTS, buildd, popcon) Reported by: Thomas Goirand <zigo@debianorg> Date: Tue, 19 Feb 2013 16: ...