CVE-2014-2237
openstack-keystone: trustee token revocation does not work with memcache backend
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions.
El memcache token backend en OpenStack Identity (Keystone) 2013.1 hasta 2.013.1.4, 2013.2 hasta 2013.2.2 y icehouse anterior a icehouse-3, cuando se emite un token de confianza con suplantaciĆ³n habilitada, no incluye este token en la lista de indice de tokens del trustee, lo que previene el token ser invalidado por la revocaciĆ³n de tokens en masa y permite al trustee evadir restricciones de acceso.
The OpenStack Identity service authenticates and authorizes OpenStack users by keeping track of users and their permitted activities. The Identity service supports multiple forms of authentication including user name and password credentials, token-based systems, and AWS-style logins. The openstack-keystone packages have been upgraded to upstream version 2013.2.3, which provides a number of bug fixes over the previous version. The following security issue is also fixed with this release: It was found that the memcached token back end of OpenStack Identity did not correctly invalidate a revoked trust token, allowing users with revoked tokens to retain access to services they should no longer be able to access. Note that only OpenStack Identity setups using the memcached back end for tokens were affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-02-28 CVE Reserved
- 2014-04-01 CVE Published
- 2024-08-06 CVE Updated
- 2025-04-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-613: Insufficient Session Expiration
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/03/04/16 | Mailing List |
|
http://www.securityfocus.com/bid/65895 | Vdb Entry | |
https://bugs.launchpad.net/keystone/+bug/1260080 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0580.html | 2015-04-23 | |
https://access.redhat.com/security/cve/CVE-2014-2237 | 2014-05-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1071434 | 2014-05-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.1 Search vendor "Openstack" for product "Keystone" and version "2013.1" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.1.1 Search vendor "Openstack" for product "Keystone" and version "2013.1.1" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.1.2 Search vendor "Openstack" for product "Keystone" and version "2013.1.2" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.1.3 Search vendor "Openstack" for product "Keystone" and version "2013.1.3" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.1.4 Search vendor "Openstack" for product "Keystone" and version "2013.1.4" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Keystone Search vendor "Openstack" for product "Keystone" | 2013.2.2 Search vendor "Openstack" for product "Keystone" and version "2013.2.2" | - |
Affected
|