CVE-2014-0105: python-keystoneclient vulnerable to context confusion in Keystone auth_token middleware
(updated )
A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user’s complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches “thread” to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.
References
- bugs.launchpad.net/python-keystoneclient/+bug/1282865
- github.com/advisories/GHSA-gwvq-rgqf-993f
- github.com/openstack/python-keystoneclient
- github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-70.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0105
- review.opendev.org/c/openstack/python-keystoneclient/+/81078
Detect and mitigate CVE-2014-0105 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →