6
CVSSv2

CVE-2014-3476

Published: 17/06/2014 Updated: 02/06/2020
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

OpenStack Identity (Keystone) prior to 2013.2.4, 2014.1 prior to 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack keystone

suse cloud 3

Vendor Advisories

Debian Bug report logs - #751454 keystone: CVE-2014-3476: privilege escalation through trust chained delegation Package: src:keystone; Maintainer for src:keystone is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 13 Jun 2014 04:48:02 UTC Severity ...
Several security issues were fixed in OpenStack Keystone ...
A flaw was found in keystone's chained delegation A trustee able to create a delegation from a trust or an OAuth token could misuse identity impersonation to bypass the enforced scope, possibly allowing them to obtain elevated privileges to the trustor's projects and roles ...