CVE-2020-12690
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/05/2020
Last modified:
07/11/2023
Description
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:* | 15.0.1 (excluding) | |
| cpe:2.3:a:openstack:keystone:16.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2020/05/07/3
- https://bugs.launchpad.net/keystone/+bug/1873290
- https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa%40%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2%40%3Ccommits.druid.apache.org%3E
- https://security.openstack.org/ossa/OSSA-2020-005.html
- https://usn.ubuntu.com/4480-1/
- https://www.openwall.com/lists/oss-security/2020/05/06/6



