PyPi: Python-Keystoneclient

CVE-2014-0105

Safety vulnerability ID: 35503

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 15, 2014 Updated at Aug 27, 2024
Scan your Python projects for vulnerabilities →

Advisory

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."

Affected package

python-keystoneclient

Latest version: 5.5.0

Client Library for OpenStack Identity

Affected versions

Fixed versions

Vulnerability changelog

The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."


MLIST:[oss-security] 20140327 [OSSA 2014-007] Potential context confusion in Keystone middleware (CVE-2014-0105): http://www.openwall.com/lists/oss-security/2014/03/27/4
CONFIRM:https://bugs.launchpad.net/python-keystoneclient/+bug/1282865: https://bugs.launchpad.net/python-keystoneclient/+bug/1282865
REDHAT:RHSA-2014:0382: http://rhn.redhat.com/errata/RHSA-2014-0382.html
REDHAT:RHSA-2014:0409: http://rhn.redhat.com/errata/RHSA-2014-0409.html

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.0

CVSS v2 Details

MEDIUM 6.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
SINGLE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL