CVE-2019-19687: Insufficiently Protected Credentials
(updated )
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users’ credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
References
- www.openwall.com/lists/oss-security/2019/12/11/8
- access.redhat.com/errata/RHSA-2019:4358
- bugs.launchpad.net/keystone/+bug/1855080
- github.com/advisories/GHSA-2j23-fwqm-mgwr
- nvd.nist.gov/vuln/detail/CVE-2019-19687
- review.opendev.org/
- review.opendev.org/
- review.opendev.org/
- security.openstack.org/ossa/OSSA-2019-006.html
Detect and mitigate CVE-2019-19687 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →