Bug 1830395 (CVE-2020-12690)
| Summary: | CVE-2020-12690 openstack-keystone: OAuth1 request token authorize silently ignores roles parameter | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> | ||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||
| Severity: | high | Docs Contact: | |||||||||
| Priority: | high | ||||||||||
| Version: | unspecified | CC: | aileenc, bdettelb, chazlett, dbecker, drieden, ggaughan, gmalinko, janstey, jjoyce, jochrist, jschluet, jwon, lbragsta, lhh, lpeer, mburns, mkaplan, nkinder, ntait, oblaut, sclewis, security-response-team, slinaber, tomckay | ||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||
| Target Release: | --- | ||||||||||
| Hardware: | All | ||||||||||
| OS: | Linux | ||||||||||
| Whiteboard: | |||||||||||
| Fixed In Version: | Keystone 15.0.1, Keystone 16.0.1 | Doc Type: | If docs needed, set a value | ||||||||
| Doc Text: |
A flaw was found in Keystone, where it inadvertently provided OAuth1 access tokens to every role assignment the creator had for a project, resulting in giving more permissions and escalated access in role assignments than intended. The greatest impact is on confidentiality.
|
Story Points: | --- | ||||||||
| Clone Of: | Environment: | ||||||||||
| Last Closed: | 2020-07-22 13:27:38 UTC | Type: | --- | ||||||||
| Regression: | --- | Mount Type: | --- | ||||||||
| Documentation: | --- | CRM: | |||||||||
| Verified Versions: | Category: | --- | |||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||
| Embargoed: | |||||||||||
| Bug Depends On: | 1831358, 1831359, 1831360, 1831361, 1832400 | ||||||||||
| Bug Blocks: | 1830398, 1850064 | ||||||||||
| Attachments: |
|
||||||||||
|
Description
Laura Pardo
2020-05-01 19:56:51 UTC
Created attachment 1683827 [details]
propossed patch
Created attachment 1683828 [details]
propossed patch
Created attachment 1683829 [details]
propossed patch
References: https://launchpad.net/bugs/1873290 Created openstack-keystone tracking bugs for this issue: Affects: openstack-rdo [bug 1832400] External References: https://security.openstack.org/ossa/OSSA-2020-005.html Acknowledgments: Name: kay (OpenStack) *** Bug 1850063 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat OpenStack Platform 15.0 (Stein) Via RHSA-2020:3102 https://access.redhat.com/errata/RHSA-2020:3102 This issue has been addressed in the following products: Red Hat OpenStack Platform 16.0 (Train) Via RHSA-2020:3105 https://access.redhat.com/errata/RHSA-2020:3105 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12690 Statement: Red Hat Quay includes keystone-client, which is not vulnerable to this (server-side) vulnerability. |