OpenStack Keystone allows context-dependent attackers to bypass access restrictions
Moderate severity
GitHub Reviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated May 9, 2024
Description
Published by the National Vulnerability Database
Apr 12, 2013
Published to the GitHub Advisory Database
May 5, 2022
Reviewed
May 9, 2024
Last updated
May 9, 2024
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
References