CVE-2017-2673

Impact:
Important
Public Date:
2017-04-25
CWE:
CWE-863
Bugzilla:
1439586: CVE-2017-2673 openstack-keystone: Incorrect role assignment with federated Keystone
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.

Find out more about CVE-2017-2673 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 6.8
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector Network
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat OpenStack Platform 9.0 (openstack-keystone) RHSA-2017:1461 2017-06-14
Red Hat OpenStack Platform 10 (openstack-keystone) RHSA-2017:1597 2017-06-28

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 8.0 (Liberty) openstack-keystone Not affected
Red Hat OpenStack Platform 11.0 (Ocata) openstack-keystone Affected
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 openstack-keystone Not affected
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 openstack-keystone Not affected
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) openstack-keystone Not affected

Acknowledgements

Red Hat would like to thank the Openstack project for reporting this issue. Upstream acknowledges Boris Bobrov (Mail.Ru) as the original reporter.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.