CVE-2013-4294: OpenStack Identity (Keystone) allows remote attackers to bypass intended access restrictions via revoked PKI token
(updated )
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
References
- access.redhat.com/errata/RHSA-2013:1285
- access.redhat.com/security/cve/CVE-2013-4294
- bugs.launchpad.net/keystone/+bug/1202952
- bugzilla.redhat.com/show_bug.cgi?id=1004452
- github.com/advisories/GHSA-5qpp-v56f-mqfm
- github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-42.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-4294
- opendev.org/openstack/keystone
Detect and mitigate CVE-2013-4294 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →