CVE-2014-3476

OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html Mailing List Third Party Advisory
http://secunia.com/advisories/57886 Third Party Advisory
http://secunia.com/advisories/59547 Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/06/12/3 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68026 Third Party Advisory VDB Entry
https://bugs.launchpad.net/keystone/+bug/1324592 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:suse:cloud:3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-06-17 14:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3476

Mitre link : CVE-2014-3476

CVE.ORG link : CVE-2014-3476


JSON object : View

Products Affected

suse

  • cloud

openstack

  • keystone
CWE
CWE-269

Improper Privilege Management