4.3
CVSSv2

CVE-2014-7144

Published: 02/10/2014 Updated: 28/11/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x prior to 0.11.0 and 1.x prior to 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote malicious users to conduct man-in-the-middle attacks via a crafted certificate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack keystonemiddleware 1.1.0

openstack python-keystoneclient

openstack keystonemiddleware 1.1.1

openstack keystonemiddleware 1.0.0

Vendor Advisories

Synopsis Moderate: python-keystoneclient security update Type/Severity Security Advisory: Moderate Topic Updated python-keystoneclient packages that fix one security issue are nowavailable for Red Hat Enterprise Linux OpenStack Platform 40Red Hat Product Security has rated this update as having Moderate s ...
Debian Bug report logs - #762748 [CVE-2014-7144] TLS cert verification option not honoured in paste configs Package: python-keystonemiddleware; Maintainer for python-keystonemiddleware is Debian OpenStack <team+openstack@trackerdebianorg>; Source for python-keystonemiddleware is src:python-keystonemiddleware (PTS, buildd, popcon) ...
Keystone could be made to expose sensitive information over the network ...