Vulnerabilities > Openstack > Keystone > Medium

DATE CVE VULNERABILITY TITLE RISK
2014-08-25 CVE-2014-5251 Credentials Management vulnerability in multiple products
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.
4.9
2014-06-17 CVE-2014-3476 Improper Privilege Management vulnerability in multiple products
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
6.0
2014-06-02 CVE-2013-2014 Improper Input Validation vulnerability in multiple products
OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests.
network
low complexity
openstack fedoraproject CWE-20
5.0
2014-04-01 CVE-2014-2237 Permissions, Privileges, and Access Controls vulnerability in Openstack Keystone
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions.
network
low complexity
openstack CWE-264
5.0
2013-12-14 CVE-2013-6391 Improper Privilege Management vulnerability in multiple products
The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from a trust-scoped token and using them in an ec2tokens API request.
5.8
2013-08-20 CVE-2013-2157 Improper Authentication vulnerability in Openstack Keystone
OpenStack Keystone Folsom, Grizzly before 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote attackers to bypass authentication via an empty password.
network
openstack CWE-287
4.3
2013-05-21 CVE-2013-2059 Improper Authentication vulnerability in Openstack Keystone 2012.1/2013.1
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
network
openstack CWE-287
6.0
2013-04-12 CVE-2013-0282 Improper Authentication vulnerability in Openstack Keystone
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
network
low complexity
openstack CWE-287
5.0
2013-04-12 CVE-2013-0270 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Openstack Keystone
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.
network
low complexity
openstack CWE-119
5.0
2013-02-24 CVE-2013-0247 Resource Management Errors vulnerability in multiple products
OpenStack Keystone Essex 2012.1.3 and earlier, Folsom 2012.2.3 and earlier, and Grizzly grizzly-2 and earlier allows remote attackers to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generation of log entries.
network
low complexity
openstack canonical CWE-399
5.0