Vulnerability Details : CVE-2012-4456
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
Vulnerability category: BypassGain privilege
Products affected by CVE-2012-4456
- cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4456
0.87%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4456
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-4456
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4456
-
http://www.securityfocus.com/bid/55716
OpenStack Keystone Token Validation Multiple Security Bypass VulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2012/09/28/5
oss-security - [OSSA 2012-015] Some actions in Keystone admin API do not validate token (CVE-2012-4456)Mailing List;Patch;Third Party Advisory
-
https://bugs.launchpad.net/keystone/+bug/1006815
Bug #1006815 “[OSSA 2012-015] Admin API /v2.0/tenants/{tenant_id...” : Bugs : OpenStack Identity (keystone)Third Party Advisory
-
https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
Require authz for user role list (bug 1006815) · openstack/keystone@14b136a · GitHubThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=861179
861179 – (CVE-2012-4456) CVE-2012-4456 Openstack Keystone 2012.1.1: fails to validate tokens in Admin APIIssue Tracking;Third Party Advisory
-
https://lists.launchpad.net/openstack/msg17034.html
[OSSA 2012-015] Some actions in Keystone admin API do not validate token (CVE-2012-4456) : Mailing list archive : openstack team in LaunchpadPatch;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/78944
OpenStack Keystone X-Auth-Token security bypass CVE-2012-4456 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
Require authz for service CRUD (bug 1006822) · openstack/keystone@24df3ad · GitHubThird Party Advisory
-
https://bugs.launchpad.net/keystone/+bug/1006822
Bug #1006822 “[OSSA 2012-015] API v2.0/OS-KSADM/services, v2.0/O...” : Bugs : OpenStack Identity (keystone)Patch;Third Party Advisory
-
https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
Require authz for service CRUD (bug 1006822) · openstack/keystone@1d146f5 · GitHubThird Party Advisory
-
https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
Require authz for user role list (bug 1006815) · openstack/keystone@8680549 · GitHubThird Party Advisory
Jump to