Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-2030


keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.


Published

2013-12-27T01:55:05.237

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 2.1 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openstack compute 2013.1 Yes
Application openstack compute 2013.1.1 Yes
Application openstack compute 2013.1.2 Yes
Application openstack compute 2013.1.3 Yes
Application openstack folsom - Yes
Application openstack grizzly 2013.1 Yes
Application openstack havana havana-1 Yes
Application openstack havana havana-2 Yes
Application openstack havana havana-3 Yes

References