DescriptionOpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected.
Overall state of this security issue: Analysis
This issue is currently rated as having low severity.SUSE Bugzilla entry: 1189390 [NEW] No SUSE Security Announcements cross referenced.
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||openstack-keystone||Affected|
|SUSE OpenStack Cloud 7||openstack-keystone||Unsupported|
|SUSE OpenStack Cloud 8||openstack-keystone||Affected|
|SUSE OpenStack Cloud 9||openstack-keystone||Affected|
|SUSE OpenStack Cloud Crowbar 8||openstack-keystone||Affected|
|SUSE OpenStack Cloud Crowbar 9||openstack-keystone||Affected|