CVE-2013-2030

keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:compute:2013.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*
cpe:2.3:a:openstack:grizzly:2013.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:havana:havana-3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-12-27 01:55

Updated : 2023-12-10 11:16


NVD link : CVE-2013-2030

Mitre link : CVE-2013-2030

CVE.ORG link : CVE-2013-2030


JSON object : View

Products Affected

openstack

  • compute
  • havana
  • folsom
  • grizzly
CWE
CWE-264

Permissions, Privileges, and Access Controls