CVE-2014-2828: OpenStack Identity (Keystone) DoS through V3 API authentication chaining
(updated )
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka “authentication chaining.”
References
- bugs.launchpad.net/keystone/+bug/1300274
- github.com/advisories/GHSA-6mv3-p2gr-wgqf
- github.com/openstack/keystone
- github.com/openstack/keystone/commit/ce6cedb30c5c4b4cf4db9380f09443de22414b39
- github.com/openstack/keystone/commit/e364ba5b12de8e4c11bd80bcca903f9615dcfc2e
- github.com/openstack/keystone/commit/ef868ad92c00e23a4a5e9eb71e3e0bf5ae2fff0c
- github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2014-106.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-2828
Detect and mitigate CVE-2014-2828 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →