The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
2020-01-17T11:15:11.813
2024-11-21T04:42:19.500
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | suse | openstack_cloud | 8.0 | Yes |
Application | suse | keystone-json-assignment | < 2019-02-18 | Yes |
Application | hp | helion_openstack | 8.0 | Yes |