8.8
CVSSv3

CVE-2019-19687

Published: 09/12/2019 Updated: 20/12/2019
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack keystone 15.0.0

openstack keystone 16.0.0

Vendor Advisories

Synopsis Important: openstack-keystone security update Type/Severity Security Advisory: Important Topic An update for openstack-keystone is now available for Red Hat OpenStackPlatform 15 (Stein)Red Hat Product Security has rated this update as having a security impactof Important A Common Vulnerability Sc ...
Debian Bug report logs - #946614 keystone: CVE-2019-19687 Package: src:keystone; Maintainer for src:keystone is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 11 Dec 2019 22:15:02 UTC Severity: grave Tags: security, upstream Found in version key ...
OpenStack Keystone could be made to expose sensitive information over the network ...