Signature Authentication Vulnerability in OpenStack Keystone
CVE-2020-12692
5.4MEDIUM
Summary
An issue has been identified in OpenStack Keystone affecting versions prior to 15.0.1 and 16.0.0, where the EC2 API fails to implement a signature time-to-live (TTL) check for AWS Signature V4. This design flaw allows attackers to capture the Authorization header during authentication and subsequently utilize it for reissuing OpenStack tokens without any restrictions. As a result, an attacker could potentially regain access repeatedly, leading to unauthorized actions within the OpenStack environment.
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved