2.1
CVSSv2

CVE-2013-2030

Published: 27/12/2013 Updated: 05/05/2014
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.

Vulnerable Product Search on Vulmon Subscribe to Product

openstack compute 2013.1.2

openstack compute 2013.1.3

openstack havana havana-1

openstack havana havana-2

openstack havana havana-3

openstack grizzly 2013.1

openstack compute 2013.1

openstack compute 2013.1.1

openstack folsom -

Vendor Advisories

Debian Bug report logs - #710157 CVE-2013-2096 Package: nova; Maintainer for nova is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 28 May 2013 16:30:05 UTC Severity: grave Tags: security Fixed in version nova/201312-2 Done: Thomas Goirand <zig ...
keystone/middleware/auth_tokenpy in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora ...