A context confusion vulnerability was identified in Keystone authtoken middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches "thread" to use eventlet. Only keystone middleware setups using authtoken with memcache are vulnerable.
{
"github_reviewed": true,
"severity": "LOW",
"nvd_published_at": "2014-04-15T14:55:00Z",
"github_reviewed_at": "2023-08-03T23:09:34Z",
"cwe_ids": [
"CWE-522"
]
}