// For flags

CVE-2014-2237

openstack-keystone: trustee token revocation does not work with memcache backend

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions.

El memcache token backend en OpenStack Identity (Keystone) 2013.1 hasta 2.013.1.4, 2013.2 hasta 2013.2.2 y icehouse anterior a icehouse-3, cuando se emite un token de confianza con suplantaciĆ³n habilitada, no incluye este token en la lista de indice de tokens del trustee, lo que previene el token ser invalidado por la revocaciĆ³n de tokens en masa y permite al trustee evadir restricciones de acceso.

The OpenStack Identity service authenticates and authorizes OpenStack users by keeping track of users and their permitted activities. The Identity service supports multiple forms of authentication including user name and password credentials, token-based systems, and AWS-style logins. The openstack-keystone packages have been upgraded to upstream version 2013.2.3, which provides a number of bug fixes over the previous version. The following security issue is also fixed with this release: It was found that the memcached token back end of OpenStack Identity did not correctly invalidate a revoked trust token, allowing users with revoked tokens to retain access to services they should no longer be able to access. Note that only OpenStack Identity setups using the memcached back end for tokens were affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-02-28 CVE Reserved
  • 2014-04-01 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-04-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-613: Insufficient Session Expiration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.1
Search vendor "Openstack" for product "Keystone" and version "2013.1"
-
Affected
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.1.1
Search vendor "Openstack" for product "Keystone" and version "2013.1.1"
-
Affected
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.1.2
Search vendor "Openstack" for product "Keystone" and version "2013.1.2"
-
Affected
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.1.3
Search vendor "Openstack" for product "Keystone" and version "2013.1.3"
-
Affected
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.1.4
Search vendor "Openstack" for product "Keystone" and version "2013.1.4"
-
Affected
Openstack
Search vendor "Openstack"
Keystone
Search vendor "Openstack" for product "Keystone"
2013.2.2
Search vendor "Openstack" for product "Keystone" and version "2013.2.2"
-
Affected