CVE-2022-2447

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2022-2447 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2105419 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openstack:keystone:-:*:*:*:*:*:*:*
OR cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*

History

01 Oct 2022, 02:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 6.6

19 Sep 2022, 20:15

Type Values Removed Values Added
Summary A flaw was found in OpenStack. The application credential tokens can be used even after they have expired. This flaw allows an authenticated remote attacker to obtain access despite the defender's efforts to remove access. A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.

14 Sep 2022, 17:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.2

07 Sep 2022, 18:27

Type Values Removed Values Added
CWE CWE-672
References (MISC) https://access.redhat.com/security/cve/CVE-2022-2447 - (MISC) https://access.redhat.com/security/cve/CVE-2022-2447 - Vendor Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2105419 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2105419 - Exploit, Issue Tracking, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Openstack
Openstack keystone
Redhat quay
Redhat
Redhat openstack Platform
Redhat storage
Redhat openstack
CPE cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:-:*:*:*:*:*:*:*

01 Sep 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-01 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-2447

Mitre link : CVE-2022-2447

CVE.ORG link : CVE-2022-2447


JSON object : View

Products Affected

openstack

  • keystone

redhat

  • openstack
  • storage
  • quay
  • openstack_platform
CWE
CWE-672

Operation on a Resource after Expiration or Release

CWE-324

Use of a Key Past its Expiration Date