[OSSA-2012-019] token expires time incorrect for auth by one token
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Identity (keystone) |
Fix Released
|
High
|
Russell Bryant | ||
Folsom |
Fix Released
|
High
|
Thierry Carrez | ||
OpenStack Security Advisory |
Fix Released
|
Undecided
|
Thierry Carrez | ||
keystone (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Quantal |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
curl -v -XGET -H "X-Auth-Token: ADMIN" http://
response(skip something):
"token": {
"id": "1854c38f436a49
},
-------------------
curl -X POST -H "Content-Type: application/json" -d '{"auth": {"token": {"id": "1854c38f436a49
response:
"token": {
"id": "8c1b1343e57e4d
...
},
-------
curl -v -XGET -H "X-Auth-Token: ADMIN" http://
response:
"token": {
"id": "8c1b1343e57e4d
},
-------
If someone get a unexpired token id, he can extend use time forever without any password credentials.
Related branches
- Openstack Ubuntu Testers: Pending requested
-
Diff: 60 lines (+37/-2)1 file modifieddebian/changelog (+37/-2)
CVE References
Changed in keystone: | |
importance: | Undecided → High |
status: | New → Confirmed |
information type: | Private Security → Public Security |
Changed in keystone (Ubuntu): | |
status: | New → Fix Released |
Changed in keystone (Ubuntu Quantal): | |
status: | New → Confirmed |
Changed in keystone: | |
milestone: | none → grizzly-2 |
status: | Fix Committed → Fix Released |
Changed in keystone: | |
milestone: | grizzly-2 → 2013.1 |
summary: |
- token expires time incorrect for auth by one token + [OSSA-2012-019] token expires time incorrect for auth by one token |
Changed in ossa: | |
assignee: | nobody → Thierry Carrez (ttx) |
status: | New → Fix Released |
Hmm, I thought that was covered by CVE-2012-3426.
Adding Keystone PTL for discussion.