PyPi: Keystone

CVE-2012-3542

Safety vulnerability ID: 35370

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 05, 2012 Updated at Oct 02, 2024
Scan your Python projects for vulnerabilities →

Advisory

OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.

Affected package

keystone

Latest version: 26.0.0

OpenStack Identity

Affected versions

Fixed versions

Vulnerability changelog

OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.


MLIST:[openstack] 20120830 [OSSA 2012-013] Keystone, Lack of authorization for adding users to tenants (CVE-2012-3542): https://lists.launchpad.net/openstack/msg16282.html
MLIST:[oss-security] 20120830 [OSSA 2012-013] Keystone, Lack of authorization for adding users to tenants (CVE-2012-3542): http://www.openwall.com/lists/oss-security/2012/08/30/6
CONFIRM:https://bugs.launchpad.net/keystone/+bug/1040626: https://bugs.launchpad.net/keystone/+bug/1040626
CONFIRM:https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155: https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155
CONFIRM:https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa: https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa
UBUNTU:USN-1552-1: http://www.ubuntu.com/usn/USN-1552-1
BID:55326: http://www.securityfocus.com/bid/55326
SECUNIA:50467: http://secunia.com/advisories/50467
SECUNIA:50494: http://secunia.com/advisories/50494

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.3

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE