Signature Authentication Vulnerability in OpenStack Keystone
CVE-2020-12692

5.4MEDIUM

Key Information:

Vendor
Openstack
Status
Vendor
CVE Published:
7 May 2020

Summary

An issue has been identified in OpenStack Keystone affecting versions prior to 15.0.1 and 16.0.0, where the EC2 API fails to implement a signature time-to-live (TTL) check for AWS Signature V4. This design flaw allows attackers to capture the Authorization header during authentication and subsequently utilize it for reissuing OpenStack tokens without any restrictions. As a result, an attacker could potentially regain access repeatedly, leading to unauthorized actions within the OpenStack environment.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.