Required CVE Record Information
Description
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
References 6 Total
- openwall.com: [oss-security] 20130528 [OSSA 2013-014] Missing expiration check in Keystone PKI tokens validation (CVE-2013-2104) mailing-list
- ubuntu.com: USN-1851-1 vendor-advisory
- rhn.redhat.com: RHSA-2013:0944 vendor-advisory
- lists.opensuse.org: openSUSE-SU-2013:1089 vendor-advisory
- https://bugs.launchpad.net/python-keystoneclient/+bug/1179615
- ubuntu.com: USN-1875-1 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- openwall.com: [oss-security] 20130528 [OSSA 2013-014] Missing expiration check in Keystone PKI tokens validation (CVE-2013-2104) mailing-listx_transferred
- ubuntu.com: USN-1851-1 vendor-advisoryx_transferred
- rhn.redhat.com: RHSA-2013:0944 vendor-advisoryx_transferred
- lists.opensuse.org: openSUSE-SU-2013:1089 vendor-advisoryx_transferred
- https://bugs.launchpad.net/python-keystoneclient/+bug/1179615 x_transferred
- ubuntu.com: USN-1875-1 vendor-advisoryx_transferred