7 results (0.010 seconds)

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

17 Apr 2015 — The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. El middleware s3_token en OpenStack keystonemiddleware anterior a 1.6.0 y python-keystoneclient anterior a 1.4.0 deshabilita la... • http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html • CWE-17: DEPRECATED: Code CWE-295: Improper Certificate Validation •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

02 Oct 2014 — OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. OpenStack keystonemiddleware (anteriormente python-keystoneclient) 0.x anterior a 0.11.0 y 1.x anterior a 1.2.0 deshabilita la verificación de certificados cuando la opción 'insegu... • http://rhn.redhat.com/errata/RHSA-2014-1783.html • CWE-295: Improper Certificate Validation CWE-310: Cryptographic Issues •

CVSS: 6.0EPSS: 0%CPEs: 7EXPL: 0

09 Apr 2014 — The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached." El middleware auth_token en la librería del cliente Python de OpenStack para Keystone (también conocido como python-keystoneclient) anterior a 0.7.0 n... • http://rhn.redhat.com/errata/RHSA-2014-0382.html • CWE-255: Credentials Management Errors •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

01 Oct 2013 — The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process. El comando user-password-update en python-keystoneclient anteriores a 0.2.4 acepta la nueva contraseña en el argumento --password, lo que permite a usuarios locales obtener información sensible listando el proceso. • http://www.openwall.com/lists/oss-security/2013/05/23/4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 1

27 Jun 2013 — python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass python-keystoneclient versión 0.2.3 hasta la versión 0.2.5, tiene una omisión de cifrado de memcache del middleware. Python-keystoneclient is the client library and command line utility for interacting with the OpenStack identity API. A flaw was found in the way python-keystoneclient handled encrypted data from memcached. Even when the memcache_security_strategy setting in "/etc/swift/proxy-server.conf" was set to ENCRYPT... • http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html • CWE-326: Inadequate Encryption Strength CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data •

CVSS: 9.8EPSS: 2%CPEs: 5EXPL: 0

27 Jun 2013 — python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass python-keystoneclient versiones 0.2.3 hasta la versión 0.2.5, tiene una omisión de firma de memcache de middleware. Python-keystoneclient is the client library and command line utility for interacting with the OpenStack identity API. A flaw was found in the way python-keystoneclient handled encrypted data from memcached. Even when the memcache_security_strategy setting in "/etc/swift/proxy-server.conf" was set to ENCRYPT to ... • http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html • CWE-345: Insufficient Verification of Data Authenticity CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

05 Jun 2013 — python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. python-keystoneclient anterior a la versión 0.2.4, tal como se usa en OpenStack Keystone (Folsom), no comprueba adecuadamente la expiración de tokens PKI, lo que permite a usuarios autenticados (1) conservar la utilización de un token después de su expir... • http://lists.opensuse.org/opensuse-updates/2013-06/msg00198.html • CWE-264: Permissions, Privileges, and Access Controls CWE-613: Insufficient Session Expiration •