MEDIUM · 4.0

CVE-2014-3621

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoi...

Vulnerability Description

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

CVSS Score

4.0

MEDIUM

AV:N/AC:L/Au:S/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
OpenstackKeystone>= 2013.2, < 2013.2.3
CanonicalUbuntu Linux14.04
RedhatOpenstack5.0
RedhatEnterprise Linux6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3621?

CVE-2014-3621 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoi...

How severe is CVE-2014-3621?

CVE-2014-3621 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3621?

Check the references section above for vendor advisories and patch information. Affected products include: Openstack Keystone, Canonical Ubuntu Linux, Redhat Openstack, Redhat Enterprise Linux.