Vulnerability Details : CVE-2012-5483
tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading administrative access and secret values from this file.
Products affected by CVE-2012-5483
- cpe:2.3:a:openstack:keystone:2012.1.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5483
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5483
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2012-5483
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5483
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html
[SECURITY] Fedora 17 Update: openstack-keystone-2012.1.3-3.fc17
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/80612
OpenStack Keystone secret key information disclosure CVE-2012-5483 Vulnerability Report
-
http://www.securityfocus.com/bid/56888
OpenStack Keystone CVE-2012-5483 Insecure File Permissions Vulnerability
-
https://bugzilla.redhat.com/show_bug.cgi?id=873447
873447 – (CVE-2012-5483) CVE-2012-5483 OpenStack: Keystone /etc/keystone/ec2rc secret key exposure
-
http://rhn.redhat.com/errata/RHSA-2012-1556.html
RHSA-2012:1556 - Security Advisory - Red Hat Customer Portal
Jump to