Safety vulnerability ID: 37770
The information on this page was manually curated by our Cybersecurity Intelligence Team.
OpenStack Keystone 15.0.0 and 16.0.0 are affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.) See: CVE-2019-19687.
Latest version: 26.0.0
OpenStack Identity
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
CONFIRM:https://security.openstack.org/ossa/OSSA-2019-006.html: https://security.openstack.org/ossa/OSSA-2019-006.html
MISC:https://bugs.launchpad.net/keystone/+bug/1855080: https://bugs.launchpad.net/keystone/+bug/1855080
MISC:https://review.opendev.org/#/c/697355/: https://review.opendev.org/#/c/697355/
MISC:https://review.opendev.org/#/c/697611/: https://review.opendev.org/#/c/697611/
MISC:https://review.opendev.org/#/c/697731/: https://review.opendev.org/#/c/697731/
MLIST:[oss-security] 20191211 [OSSA-2019-006] Keystone: Credentials API allows listing and retrieving of all users credentials (CVE-2019-19687): http://www.openwall.com/lists/oss-security/2019/12/11/8
REDHAT:RHSA-2019:4358: https://access.redhat.com/errata/RHSA-2019:4358
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application