CVE-2014-7144: OpenStack keystonemiddleware does not verify certificate
(updated )
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the “insecure” option is set in a paste configuration (paste.ini
) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
References
- bugs.launchpad.net/python-keystoneclient/+bug/1353315
- github.com/advisories/GHSA-7f2c-vp52-gmfw
- github.com/openstack/ossa/blob/23e15de721f4a6890374a231d93524e02965a97f/ossa/OSSA-2014-030.yaml
- github.com/pypa/advisory-database/tree/main/vulns/keystonemiddleware/PYSEC-2014-26.yaml
- github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-71.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-7144
- web.archive.org/web/20200228053850/http://www.securityfocus.com/bid/69864
- web.archive.org/web/20200228060511/https://www.securityfocus.com/bid/69864
Detect and mitigate CVE-2014-7144 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →