Bug 1830395 (CVE-2020-12690)
Summary: | CVE-2020-12690 openstack-keystone: OAuth1 request token authorize silently ignores roles parameter | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> | ||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||||
Severity: | high | Docs Contact: | |||||||||
Priority: | high | ||||||||||
Version: | unspecified | CC: | aileenc, bdettelb, chazlett, dbecker, drieden, ggaughan, gmalinko, janstey, jjoyce, jochrist, jschluet, jwon, lbragsta, lhh, lpeer, mburns, mkaplan, nkinder, ntait, oblaut, sclewis, security-response-team, slinaber, tomckay | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Keystone 15.0.1, Keystone 16.0.1 | Doc Type: | If docs needed, set a value | ||||||||
Doc Text: |
A flaw was found in Keystone, where it inadvertently provided OAuth1 access tokens to every role assignment the creator had for a project, resulting in giving more permissions and escalated access in role assignments than intended. The greatest impact is on confidentiality.
|
Story Points: | --- | ||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2020-07-22 13:27:38 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | 1831358, 1831359, 1831360, 1831361, 1832400 | ||||||||||
Bug Blocks: | 1830398, 1850064 | ||||||||||
Attachments: |
|
Description
Laura Pardo
2020-05-01 19:56:51 UTC
Created attachment 1683827 [details]
propossed patch
Created attachment 1683828 [details]
propossed patch
Created attachment 1683829 [details]
propossed patch
References: https://launchpad.net/bugs/1873290 Created openstack-keystone tracking bugs for this issue: Affects: openstack-rdo [bug 1832400] External References: https://security.openstack.org/ossa/OSSA-2020-005.html Acknowledgments: Name: kay (OpenStack) *** Bug 1850063 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat OpenStack Platform 15.0 (Stein) Via RHSA-2020:3102 https://access.redhat.com/errata/RHSA-2020:3102 This issue has been addressed in the following products: Red Hat OpenStack Platform 16.0 (Train) Via RHSA-2020:3105 https://access.redhat.com/errata/RHSA-2020:3105 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12690 Statement: Red Hat Quay includes keystone-client, which is not vulnerable to this (server-side) vulnerability. |