CVE-2014-3621: OpenStack Identity Keystone Exposure of Sensitive Information
(updated )
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by “$(admin_token)” in the publicurl endpoint field.
References
- access.redhat.com/errata/RHSA-2014:1688
- access.redhat.com/errata/RHSA-2014:1789
- access.redhat.com/errata/RHSA-2014:1790
- access.redhat.com/security/cve/CVE-2014-3621
- bugs.launchpad.net/keystone/+bug/1354208
- bugzilla.redhat.com/show_bug.cgi?id=1139937
- github.com/advisories/GHSA-8v8f-vc72-pmhc
- github.com/openstack/keystone/commit/2989ff257e4fde6a168e25b926805e700406aa80
- github.com/openstack/keystone/commit/52714633c9a4dae5e60279217090859aa6dbcb4f
- nvd.nist.gov/vuln/detail/CVE-2014-3621
Detect and mitigate CVE-2014-3621 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →