Vulnerability Name: | CVE-2012-4456 (CCN-78944) | ||||||||
Assigned: | 2012-09-27 | ||||||||
Published: | 2012-09-27 | ||||||||
Updated: | 2023-02-13 | ||||||||
Summary: | |||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2012-4456 Source: CCN Type: OpenStack Web site Welcome to Keystone, the OpenStack Identity Service! Source: CCN Type: SA50665 OpenStack Keystone Token Verification Bypass Vulnerabilities Source: secalert@redhat.com Type: Mailing List, Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: BID-55716 OpenStack Keystone Token Validation Multiple Security Bypass Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 861179 Red Hat Bugzilla Bug 861179 CVE-2012-4456 Openstack Keystone 2012.1.1: fails to validate tokens in Admin API Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: XF Type: UNKNOWN keystone-xauth-sec-bypass(78944) Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com | ||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |