CVE-2014-5252: OpenStack Identity (Keystone) UUID v2 tokens does not expire with revocation events
(updated )
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
References
- bugs.launchpad.net/keystone/+bug/1348820
- github.com/advisories/GHSA-v8fq-gq9j-3v7h
- github.com/openstack/keystone
- github.com/openstack/keystone/commit/556fb860311675fc437585651e4602b2908451eb
- github.com/openstack/keystone/commit/a4c73e4382cb062aa9f30fe1960d5014d3c49cc2
- github.com/openstack/keystone/commit/bdb88c662ac2035f9b0d8a229a5db5f60f5f16ae
- github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2014-108.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-5252
Detect and mitigate CVE-2014-5252 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →