Upstream information
Description
A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access.SUSE information
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
| CVSS detail | National Vulnerability Database |
|---|---|
| Base Score | 3.5 |
| Vector | AV:N/AC:M/Au:S/C:N/I:P/A:N |
| Access Vector | Network |
| Access Complexity | Medium |
| Authentication | Single |
| Confidentiality Impact | None |
| Integrity Impact | Partial |
| Availability Impact | None |
SUSE Security Advisories:
- SUSE-SU-2012:1675-1, published Wed Dec 19 10:08:36 MST 2012
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 08:51:58 2013CVE page last modified: Tue Apr 7 13:20:56 2026