A context confusion vulnerability was identified in Keystone authtoken middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches "thread" to use eventlet. Only keystone middleware setups using authtoken with memcache are vulnerable.
{ "nvd_published_at": "2014-04-15T14:55:00Z", "cwe_ids": [ "CWE-522" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2023-08-03T23:09:34Z" }