Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-14432


In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.


Published

2018-07-31T14:29:00.713

Last Modified

2024-11-21T03:49:02.453

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System debian debian_linux 9.0 Yes
Application redhat openstack 10 Yes
Application redhat openstack 12 Yes
Application redhat openstack 13 Yes
Application openstack keystone < 11.0.4 Yes
Application openstack keystone 12.0.0 Yes
Application openstack keystone 13.0.0 Yes

References