OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2012-1557.html | vendor-advisory x_refsource_REDHAT |
| http://www.openwall.com/lists/oss-security/2012/11/28/5 | mailing-list x_refsource_MLIST |
| https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5 | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/56727 | vdb-entry x_refsource_BID |
| http://www.ubuntu.com/usn/USN-1641-1 | vendor-advisory x_refsource_UBUNTU |
| https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2012/11/28/6 | mailing-list x_refsource_MLIST |
| https://bugs.launchpad.net/keystone/+bug/1079216 | x_refsource_CONFIRM |
| http://secunia.com/advisories/51423 | third-party-advisory x_refsource_SECUNIA |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/80370 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/51436 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|