CVE-2019-19687
Published: 9 December 2019
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
Notes
Author | Note |
---|---|
mdeslaur |
introduced in keystone 15.0.0, present in 16.0.0 too |
Priority
Status
Package | Release | Status |
---|---|---|
keystone
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(2:13.0.2-0ubuntu1)
|
disco |
Ignored
(end of life)
|
|
eoan |
Released
(2:16.0.0-0ubuntu1.1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(2:9.3.0-0ubuntu3.2)
|
|
Patches:
upstream: https://opendev.org/openstack/keystone/commit/17947516b0095c51da5cff94771247f2e7c44ee6 upstream: https://opendev.org/openstack/keystone/commit/bd3f63787151183f4daa43578aa491856fefae5b |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |