Steven Hardy discovered that OpenStack Keystone did not properly handle chained delegation. A remove authenticated attacker could use this to gain privileges by creating a new token with additional roles. (CVE-2014-3476)
Jamie Lennox discovered that OpenStack Keystone did not properly validate the project id. A remote authenticated attacker may be able to use this to access other projects. (CVE-2014-3520)
Brant Knudson and Lance Bragstad discovered that OpenStack Keystone would not always revoke tokens correctly. If Keystone were configured to use revocation events, a remote authenticated attacker could continue to have access to resources. (CVE-2014-5251, CVE-2014-5252, CVE-2014-5253)
{ "binaries": [ { "binary_version": "1:2014.1.2.1-0ubuntu1.1", "binary_name": "keystone" }, { "binary_version": "1:2014.1.2.1-0ubuntu1.1", "binary_name": "python-keystone" } ], "availability": "No subscription required" }
{ "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "id": "CVE-2014-5251", "severity": [ { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2014-5252", "severity": [ { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2014-5253", "severity": [ { "type": "Ubuntu", "score": "medium" } ] } ] }