Skip to content

OpenStack Identity (Keystone) UUID v2 tokens does not expire with revocation events

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Nov 21, 2024

Package

pip keystone (pip)

Affected versions

< 8.0.0a0

Patched versions

8.0.0a0

Description

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.

References

Published by the National Vulnerability Database Aug 25, 2014
Published to the GitHub Advisory Database May 17, 2022
Reviewed May 14, 2024
Last updated Nov 21, 2024

Severity

Moderate

EPSS score

0.169%
(55th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2014-5252

GHSA ID

GHSA-v8fq-gq9j-3v7h

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.