Computer Security
[EN] securityvulns.ru no-pyccku


OpenStack Keystone restrictions bypass
Published:24.08.2015
Source:
SecurityVulns ID:14650
Type:m-i-t-m
Threat Level:
5/10
Description:Certificates validation bypass.
CVE:CVE-2015-1852 (The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.)
 CVE-2014-7144 (OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.)
Original documentdocumentUBUNTU, [USN-2705-1] Keystone vulnerabilities (24.08.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod