CVE-2018-14432
A flaw was found in Keystone federation. By doing GET /v3/OS-FEDERATION/projects an authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
Find out more about CVE-2018-14432 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v3 metrics
| CVSS3 Base Score | 5.3 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity Impact | None |
| Availability Impact | None |
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat OpenStack Platform 13.0 (Queens) (openstack-keystone) | RHSA-2018:2533 | 2018-08-21 |
| Red Hat OpenStack Platform 12.0 (openstack-keystone) | RHSA-2018:2523 | 2018-08-20 |
| Red Hat OpenStack Platform 10 (openstack-keystone) | RHSA-2018:2543 | 2018-08-22 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat OpenStack Platform 9.0 | openstack-keystone | Not affected |
| Red Hat OpenStack Platform 8.0 (Liberty) | openstack-keystone | Not affected |
| Red Hat JBoss Fuse 7 | openstack-keystone | Under investigation |
| Red Hat JBoss Fuse 6 | openstack-keystone | Under investigation |
| Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | openstack-keystone | Not affected |
