CVE-2014-3621
Publication date 2 October 2014
Last updated 24 July 2024
Ubuntu priority
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
Status
Package | Ubuntu Release | Status |
---|---|---|
keystone | ||
16.04 LTS xenial |
Fixed 1:2014.2~rc1-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 1:2014.1.3-0ubuntu1
|
|
Notes
jdstrand
12.04 is affected. Create test service and malicious endpoint as per the bug, then do (assumes 'testadmin' is in the 'admin' project (use tenant id from `keystone tenant-list|grep admin`): curl -k -X 'POST' -v http://127.0.0.1:5000/v2.0/tokens -d '{"auth":{"passwordCredentials":{"username": "testadmin", "password":"<pass>"}, "tenantId": "<id>"}}' -H 'Content-type: application/json' | python -m json.tool
Patch details
Package | Patch details |
---|---|
keystone |
|
References
Related Ubuntu Security Notices (USN)
- USN-2406-1
- OpenStack Keystone vulnerability
- 11 November 2014