OAuth1 Access Token Role Assignment Issue in OpenStack Keystone
CVE-2020-12690
8.8HIGH
Summary
A vulnerability exists in OpenStack Keystone that allows for the silent ignoring of role parameters in OAuth1 access tokens. When an OAuth1 access token is used to request a Keystone token, it inadvertently includes all role assignments associated with the user's project, regardless of the roles intended to be shared. This misconfiguration could potentially grant users escalated access to resources, allowing for operations that should be restricted based on the initial role permissions. Users of OpenStack Keystone are encouraged to update to recommended versions to mitigate this action.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved