OAuth1 Access Token Role Assignment Issue in OpenStack Keystone
CVE-2020-12690

8.8HIGH

Key Information:

Vendor
Openstack
Status
Vendor
CVE Published:
7 May 2020

Summary

A vulnerability exists in OpenStack Keystone that allows for the silent ignoring of role parameters in OAuth1 access tokens. When an OAuth1 access token is used to request a Keystone token, it inadvertently includes all role assignments associated with the user's project, regardless of the roles intended to be shared. This misconfiguration could potentially grant users escalated access to resources, allowing for operations that should be restricted based on the initial role permissions. Users of OpenStack Keystone are encouraged to update to recommended versions to mitigate this action.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.