{"api_version":"1","generated_at":"2026-04-23T04:09:56+00:00","cve":"CVE-2012-5571","urls":{"html":"https://cve.report/CVE-2012-5571","api":"https://cve.report/api/cve/CVE-2012-5571.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-5571","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-5571"},"summary":{"title":"Openstack keystone: openstack keystone: authorization bypass via improper ec2 token handling","description":"A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access.","state":"PUBLISHED","assigner":"redhat","published_at":"2012-12-18 01:55:03","updated_at":"2026-04-07 07:16:22"},"problem_types":["CWE-639","CWE-255","CWE-639 Authorization Bypass Through User-Controlled Key"],"metrics":[{"version":"3.1","source":"secalert@redhat.com","type":"Primary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"3.5","severity":"","vector":"AV:N/AC:M/Au:S/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6","name":"http://www.openwall.com/lists/oss-security/2012/11/28/6","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"oss-security - [OSSA 2012-019] Extension of token validity through token chaining\n (CVE-2012-5563)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html","name":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora 17 Update: openstack-keystone-2012.1.3-3.fc17","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/51436","name":"http://secunia.com/advisories/51436","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Security Advisory SA51436 - Ubuntu update for keystone - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/security/cve/CVE-2012-5571","name":"https://access.redhat.com/security/cve/CVE-2012-5571","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5","name":"http://www.openwall.com/lists/oss-security/2012/11/28/5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"oss-security - [OSSA 2012-018] EC2-style credentials invalidation issue (CVE-2012-5571)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html","name":"http://rhn.redhat.com/errata/RHSA-2012-1557.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653","name":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Ensures User is member of tenant in ec2 validation · openstack/keystone@9d68b40 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/51423","name":"http://secunia.com/advisories/51423","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-1641-1","name":"http://www.ubuntu.com/usn/USN-1641-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-1641-1: OpenStack Keystone vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.launchpad.net/keystone/+bug/1064914","name":"https://bugs.launchpad.net/keystone/+bug/1064914","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Bug #1064914 “Removing user from a tenant isn't invalidating use...” : Bugs : Keystone","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/56726","name":"http://www.securityfocus.com/bid/56726","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"OpenStack Keystone CVE-2012-5571 Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b","name":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Ensures User is member of tenant in ec2 validation · openstack/keystone@37308dd · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19","name":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Ensures User is member of tenant in ec2 validation · openstack/keystone@8735009 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html","name":"http://rhn.redhat.com/errata/RHSA-2012-1556.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-5571","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5571","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 13 (Queens)","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 16.2","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 16.2","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 17.1","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 17.1","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 18.0","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenStack Platform 18.0","version":"","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-04-02T15:02:50.229Z","lang":"en","value":"Reported to Red Hat."},{"source":"CNA","time":"2012-12-18T01:00:00.000Z","lang":"en","value":"Made public."}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"5571","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"essex","cpe6":"2012.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5571","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openstack","cpe5":"folsom","cpe6":"2012.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2012","cve_id":"5571","cve":"CVE-2012-5571","epss":"0.001520000","percentile":"0.358850000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:39"},"legacy_qids":[{"cve":"CVE-2012-5571","qid":"996729","title":"Python (Pip) Security Update for Keystone (GHSA-qvpr-qm6w-6rcc)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T21:14:15.748Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19"},{"name":"RHSA-2012:1557","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html"},{"name":"RHSA-2012:1556","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html"},{"name":"[oss-security] 20121128 [OSSA 2012-018] EC2-style credentials invalidation issue (CVE-2012-5571)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5"},{"name":"USN-1641-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1641-1"},{"name":"keystone-tenant-sec-bypass(80333)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugs.launchpad.net/keystone/+bug/1064914"},{"name":"[oss-security] 20121128 [OSSA 2012-019] Extension of token validity through token chaining (CVE-2012-5563)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653"},{"name":"51423","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/51423"},{"name":"56726","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/56726"},{"name":"51436","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/51436"},{"name":"FEDORA-2012-19341","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:13"],"defaultStatus":"affected","packageName":"redhat-user-workloads/openstack-keystone","product":"Red Hat OpenStack Platform 13 (Queens)","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:16.2"],"defaultStatus":"affected","packageName":"openstack-keystone","product":"Red Hat OpenStack Platform 16.2","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:16.2"],"defaultStatus":"affected","packageName":"redhat-user-workloads/openstack-keystone","product":"Red Hat OpenStack Platform 16.2","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:17.1"],"defaultStatus":"affected","packageName":"openstack-keystone","product":"Red Hat OpenStack Platform 17.1","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:17.1"],"defaultStatus":"affected","packageName":"redhat-user-workloads/openstack-keystone","product":"Red Hat OpenStack Platform 17.1","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:18.0"],"defaultStatus":"affected","packageName":"openstack-keystone","product":"Red Hat OpenStack Platform 18.0","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openstack:18.0"],"defaultStatus":"affected","packageName":"redhat-user-workloads/openstack-keystone","product":"Red Hat OpenStack Platform 18.0","vendor":"Red Hat"}],"datePublic":"2012-12-18T01:00:00.000Z","descriptions":[{"lang":"en","value":"A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access."}],"metrics":[{"other":{"content":{"namespace":"https://access.redhat.com/security/updates/classification/","value":"Moderate"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"Authorization Bypass Through User-Controlled Key","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-07T06:55:17.789Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html"},{"url":"http://secunia.com/advisories/51423"},{"url":"http://secunia.com/advisories/51436"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6"},{"url":"http://www.securityfocus.com/bid/56726"},{"url":"http://www.ubuntu.com/usn/USN-1641-1"},{"tags":["vdb-entry","x_refsource_REDHAT"],"url":"https://access.redhat.com/security/cve/CVE-2012-5571"},{"url":"https://bugs.launchpad.net/keystone/+bug/1064914"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333"},{"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b"},{"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19"},{"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653"}],"timeline":[{"lang":"en","time":"2026-04-02T15:02:50.229Z","value":"Reported to Red Hat."},{"lang":"en","time":"2012-12-18T01:00:00.000Z","value":"Made public."}],"title":"Openstack keystone: openstack keystone: authorization bypass via improper ec2 token handling","x_generator":{"engine":"cvelib 1.8.0"},"x_redhatCweChain":"CWE-639: Authorization Bypass Through User-Controlled Key"}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-5571","datePublished":"2012-12-18T01:00:00.000Z","dateReserved":"2012-10-24T00:00:00.000Z","dateUpdated":"2026-04-07T06:55:17.789Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2012-12-18 01:55:03","lastModifiedDate":"2026-04-07 07:16:22","problem_types":["CWE-639","CWE-255","CWE-639 Authorization Bypass Through User-Controlled Key"],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*","matchCriteriaId":"E5FDB43F-B315-4F68-9D86-B644F2D4DF9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*","matchCriteriaId":"E76B76AB-D744-4163-8615-7BA18ABB1347"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"5571","Ordinal":"1","Title":"Openstack keystone: openstack keystone: authorization bypass via","CVE":"CVE-2012-5571","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"5571","Ordinal":"1","NoteData":"A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access.","Type":"Description","Title":"Openstack keystone: openstack keystone: authorization bypass via"},{"CveYear":"2012","CveId":"5571","Ordinal":"2","NoteData":"2012-12-17","Type":"Other","Title":"Published"},{"CveYear":"2012","CveId":"5571","Ordinal":"3","NoteData":"2017-08-28","Type":"Other","Title":"Modified"}]}}}