QID 996729

Date Published: 2024-01-17

QID 996729: Python (Pip) Security Update for Keystone (GHSA-qvpr-qm6w-6rcc)

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 3.5 severity.
  • Solution
    Refer to Github security advisory GHSA-qvpr-qm6w-6rcc for updates and patch information.
    Vendor References

    CVEs related to QID 996729

    Software Advisories
    Advisory ID Software Component Link
    GHSA-qvpr-qm6w-6rcc Keystone URL Logo github.com/advisories/GHSA-qvpr-qm6w-6rcc