A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3563 | Issue Tracking Third Party Advisory |
https://bugs.launchpad.net/ossa/+bug/1901891 | Exploit Issue Tracking Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1962908 | Exploit Issue Tracking Third Party Advisory Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2024/01/msg00007.html | |
https://security-tracker.debian.org/tracker/CVE-2021-3563 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Jan 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Nov 2022, 17:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
31 Aug 2022, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack_platform:10.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:* cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:* |
|
First Time |
Debian debian Linux
Openstack keystone Redhat Redhat openstack Platform Openstack Debian |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | (MISC) https://security-tracker.debian.org/tracker/CVE-2021-3563 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://bugs.launchpad.net/ossa/+bug/1901891 - Exploit, Issue Tracking, Third Party Advisory, VDB Entry | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2021-3563 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1962908 - Exploit, Issue Tracking, Third Party Advisory, Vendor Advisory |
26 Aug 2022, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-26 16:15
Updated : 2024-01-21 23:15
NVD link : CVE-2021-3563
Mitre link : CVE-2021-3563
CVE.ORG link : CVE-2021-3563
JSON object : View
Products Affected
redhat
- openstack_platform
debian
- debian_linux
openstack
- keystone
CWE
CWE-863
Incorrect Authorization