CVE-2019-3683
Summary
| CVE | CVE-2019-3683 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-17 11:15:00 UTC |
| Updated | 2020-10-22 13:41:00 UTC |
| Description | The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations. |
Risk And Classification
Problem Types: CWE-732
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Hp | Helion Openstack | 8.0 | All | All | All |
| Application | Hp | Helion Openstack | 8.0 | All | All | All |
| Application | Suse | Keystone-json-assignment | All | All | All | All |
| Application | Suse | Keystone-json-assignment | All | All | All | All |
| Application | Suse | Openstack Cloud | 8.0 | All | All | All |
| Application | Suse | Openstack Cloud | 8.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Access Denied | CONFIRM | bugzilla.suse.com | Issue Tracking, Permissions Required |
| CVE-2019-3683 | SUSE | MISC | www.suse.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Kurt Garloff by SUSE
There are currently no legacy QID mappings associated with this CVE.