Safety vulnerability ID: 35503
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."
Latest version: 5.5.0
Client Library for OpenStack Identity
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."
MLIST:[oss-security] 20140327 [OSSA 2014-007] Potential context confusion in Keystone middleware (CVE-2014-0105): http://www.openwall.com/lists/oss-security/2014/03/27/4
CONFIRM:https://bugs.launchpad.net/python-keystoneclient/+bug/1282865: https://bugs.launchpad.net/python-keystoneclient/+bug/1282865
REDHAT:RHSA-2014:0382: http://rhn.redhat.com/errata/RHSA-2014-0382.html
REDHAT:RHSA-2014:0409: http://rhn.redhat.com/errata/RHSA-2014-0409.html
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application