A vulnerability was discovered in OpenStack: Title: S3Token TLS cert verification option not honored Reporter: Brant Knudson (IBM) Products: keystonemiddleware, python-keystoneclient Affects: versions up to 1.5.0 (keystonemiddleware), versions up to 0.11.2 (python-keystoneclient) Description: Brant Knudson from IBM reported a vulnerability in keystonemiddleware (formerly shipped as python-keystoneclient). When the 'insecure' option is set in a S3Token paste configuration file its value is effectively ignored and instead assumed to be true. As a result certificate verification will be disabled, leaving TLS connections open to MITM attacks. Note that it's unusual to explicitly add this option and then set it to false, so the impact of this bug is thought to be limited. All versions of s3_token middleware with TLS settings configured are affected by this flaw. Acknowledgements: Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.
Created attachment 1013072 [details] cve-2015-1852-master-keystoneclient.patch
Created attachment 1013073 [details] cve-2015-1852-master-keystonemiddleware.patch
Note that it's unusual to explicitly add this option and then set it to false, so the impact of this bug is thought to be limited.
python-keystonemiddleware-1.3.2-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
Upstream advisory: https://security.openstack.org/ossa/OSSA-2015-007.html
This issue has been addressed in the following products: OpenStack 6 for RHEL 7 Via RHSA-2015:1677 https://rhn.redhat.com/errata/RHSA-2015-1677.html
This issue has been addressed in the following products: OpenStack 5 for RHEL 7 OpenStack 5 for RHEL 6 Via RHSA-2015:1685 https://rhn.redhat.com/errata/RHSA-2015-1685.html
Created python-keystoneclient tracking bugs for this issue: Affects: openstack-rdo [bug 1256638]