MEDIUM · 4.9

CVE-2014-5252

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the toke...

Vulnerability Description

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

CVSS Score

4.9

MEDIUM

AV:N/AC:M/Au:S/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
OpenstackKeystone2014.1
CanonicalUbuntu Linux14.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-5252?

CVE-2014-5252 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the toke...

How severe is CVE-2014-5252?

CVE-2014-5252 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-5252?

Check the references section above for vendor advisories and patch information. Affected products include: Openstack Keystone, Canonical Ubuntu Linux.