Vulnerability Name: | CVE-2013-4477 (CCN-88333) | ||||||||||||
Assigned: | 2013-10-29 | ||||||||||||
Published: | 2013-10-29 | ||||||||||||
Updated: | 2014-03-06 | ||||||||||||
Summary: | The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. | ||||||||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||||||
CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N) 2.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
2.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-4477 Source: CCN Type: OpenStack Web site Welcome to Keystone, the OpenStack Identity Service Source: CCN Type: RHSA-2014-0113 Moderate: openstack-keystone security update Source: REDHAT Type: UNKNOWN RHSA-2014:0113 Source: CCN Type: oss-sec Mailing List, Tue, 29 Oct 2013 09:55:27 -0600 Re: CVE request for a vulnerability in OpenStack Keystone Source: MLIST Type: Patch [oss-security] 20131030 [OSSA 2013-028] Unintentional role granting with Keystone LDAP backend (CVE-2013-4477) Source: CCN Type: BID-63395 OpenStack Keystone LDAP Assignment Security Bypass Vulnerability Source: UBUNTU Type: UNKNOWN USN-2034-1 Source: CCN Type: OSSA 2013-028 Removing role adds role with LDAP backend Source: CONFIRM Type: Exploit https://bugs.launchpad.net/keystone/+bug/1242855 Source: XF Type: UNKNOWN keystone-cve20134477-unauth-priv(88333) Source: CCN Type: WhiteSource Vulnerability Database CVE-2013-4477 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |