CVE-2014-3621

Impact:
Important
Public Date:
2014-09-16
CWE:
CWE-200
Bugzilla:
1139937: CVE-2014-3621 openstack-keystone: configuration data information leak through Keystone catalog
A flaw was found in the keystone catalog URL replacement. A user with permissions to register an endpoint could use this flaw to leak configuration data, including the master admin_token. Only keystone setups that allow non-cloud-admin users to create endpoints were affected by this issue.

Find out more about CVE-2014-3621 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 3.6
Base Metrics AV:N/AC:H/Au:S/C:P/I:P/A:N
Access Vector Network
Access Complexity High
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 (openstack-keystone) RHSA-2014:1789 2014-11-03
Red Hat Enterprise Linux OpenStack Platform 4.0 (openstack-keystone) RHSA-2014:1688 2014-10-22
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (openstack-keystone) RHSA-2014:1790 2014-11-03

Acknowledgements

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.
Last Modified