CVE-2021-3563

A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2021-3563 Issue Tracking Third Party Advisory
https://bugs.launchpad.net/ossa/+bug/1901891 Exploit Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1962908 Exploit Issue Tracking Third Party Advisory Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html
https://security-tracker.debian.org/tracker/CVE-2021-3563 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*

History

21 Jan 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html -

28 Nov 2022, 17:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 7.4

31 Aug 2022, 18:35

Type Values Removed Values Added
CWE CWE-863
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
First Time Debian debian Linux
Openstack keystone
Redhat
Redhat openstack Platform
Openstack
Debian
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References (MISC) https://security-tracker.debian.org/tracker/CVE-2021-3563 - (MISC) https://security-tracker.debian.org/tracker/CVE-2021-3563 - Exploit, Issue Tracking, Third Party Advisory
References (MISC) https://bugs.launchpad.net/ossa/+bug/1901891 - (MISC) https://bugs.launchpad.net/ossa/+bug/1901891 - Exploit, Issue Tracking, Third Party Advisory, VDB Entry
References (MISC) https://access.redhat.com/security/cve/CVE-2021-3563 - (MISC) https://access.redhat.com/security/cve/CVE-2021-3563 - Issue Tracking, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1962908 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1962908 - Exploit, Issue Tracking, Third Party Advisory, Vendor Advisory

26 Aug 2022, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-26 16:15

Updated : 2024-01-21 23:15


NVD link : CVE-2021-3563

Mitre link : CVE-2021-3563

CVE.ORG link : CVE-2021-3563


JSON object : View

Products Affected

redhat

  • openstack_platform

debian

  • debian_linux

openstack

  • keystone
CWE
CWE-863

Incorrect Authorization