CVE-2014-5252

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:2014.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:2014.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:juno-1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:juno-2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

History

No history.

Information

Published : 2014-08-25 14:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-5252

Mitre link : CVE-2014-5252

CVE.ORG link : CVE-2014-5252


JSON object : View

Products Affected

canonical

  • ubuntu_linux

openstack

  • keystone
CWE
CWE-255

Credentials Management Errors