CVE-2012-5563
OpenStack: Keystone extension of token validity through token chaining
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
OpenStack Keystone, como se usa en OpenStack Folsom 2012.2, no aplica correctamente el vencimiento del token, lo que permite a usuarios autenticados remotamente eludir las restricciones previstas por la creación de nuevos tokens mediante el encadenamiento de token. NOTA: este problema existe debido a una regresión de CVE-2012-3426.
The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. The openstack-keystone packages have been upgraded to upstream version 2012.2.1, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following security issues: A flaw in Keystone allowed an attacker with access to the web and network interfaces to continue using chained tokens linked to tokens that had expired. This would allow the attacker to continue using the tokens despite the parent token being expired, giving them continued access to OpenStack services.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-10-24 CVE Reserved
- 2012-11-29 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-255: Credentials Management Errors
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/56727 | Vdb Entry | |
https://bugs.launchpad.net/keystone/+bug/1079216 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80370 | Vdb Entry | |
https://github.com/openstack/keystone/commit/38c7e46a640a94da4da89a39a5a1ea9c081f1eb5 | X_refsource_confirm | |
https://github.com/openstack/keystone/commit/f9d4766249a72d8f88d75dcf1575b28dd3496681 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/11/28/5 | 2023-11-07 | |
http://www.openwall.com/lists/oss-security/2012/11/28/6 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-1557.html | 2023-11-07 | |
http://secunia.com/advisories/51423 | 2023-11-07 | |
http://secunia.com/advisories/51436 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-1641-1 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2012-5563 | 2012-12-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=879402 | 2012-12-10 |