Bug 1209527 (CVE-2015-1852) - CVE-2015-1852 OpenStack keystonemiddleware/keystoneclient: S3Token TLS cert verification option not honored
Summary: CVE-2015-1852 OpenStack keystonemiddleware/keystoneclient: S3Token TLS cert v...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-1852
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1229487 1246330 1246331 1248326 1248327 1256638
Blocks: 1209529
TreeView+ depends on / blocked
 
Reported: 2015-04-07 14:59 UTC by Vasyl Kaigorodov
Modified: 2023-05-12 07:55 UTC (History)
18 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-08-25 07:21:40 UTC
Embargoed:


Attachments (Terms of Use)
cve-2015-1852-master-keystoneclient.patch (3.23 KB, text/plain)
2015-04-10 10:10 UTC, Vasyl Kaigorodov
no flags Details
cve-2015-1852-master-keystonemiddleware.patch (3.19 KB, text/plain)
2015-04-10 10:10 UTC, Vasyl Kaigorodov
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Launchpad 1411063 0 None None None Never
Red Hat Product Errata RHSA-2015:1677 0 normal SHIPPED_LIVE Moderate: python-keystoneclient and python-keystonemiddlware security update 2015-08-25 00:17:02 UTC
Red Hat Product Errata RHSA-2015:1685 0 normal SHIPPED_LIVE Moderate: python-keystoneclient security update 2015-08-25 09:44:02 UTC

Description Vasyl Kaigorodov 2015-04-07 14:59:56 UTC
A vulnerability was discovered in OpenStack:

Title: S3Token TLS cert verification option not honored
Reporter: Brant Knudson (IBM)
Products: keystonemiddleware, python-keystoneclient
Affects: versions up to 1.5.0 (keystonemiddleware),
         versions up to 0.11.2 (python-keystoneclient)

Description:
Brant Knudson from IBM reported a vulnerability in keystonemiddleware
(formerly shipped as python-keystoneclient). When the 'insecure' option
is set in a S3Token paste configuration file its value is effectively
ignored and instead assumed to be true. As a result certificate
verification will be disabled, leaving TLS connections open to MITM
attacks. Note that it's unusual to explicitly add this option and then
set it to false, so the impact of this bug is thought to be limited. All
versions of s3_token middleware with TLS settings configured are
affected by this flaw.

Acknowledgements:

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.

Comment 1 Vasyl Kaigorodov 2015-04-10 10:10:18 UTC
Created attachment 1013072 [details]
cve-2015-1852-master-keystoneclient.patch

Comment 2 Vasyl Kaigorodov 2015-04-10 10:10:36 UTC
Created attachment 1013073 [details]
cve-2015-1852-master-keystonemiddleware.patch

Comment 3 Vasyl Kaigorodov 2015-04-10 10:54:15 UTC
Note that it's unusual to explicitly add this option and then
set it to false, so the impact of this bug is thought to be limited.

Comment 5 Fedora Update System 2015-07-19 01:59:08 UTC
python-keystonemiddleware-1.3.2-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Garth Mollett 2015-08-24 03:16:46 UTC
Upstream advisory:

https://security.openstack.org/ossa/OSSA-2015-007.html

Comment 10 errata-xmlrpc 2015-08-24 20:17:40 UTC
This issue has been addressed in the following products:

  OpenStack 6 for RHEL 7

Via RHSA-2015:1677 https://rhn.redhat.com/errata/RHSA-2015-1677.html

Comment 11 errata-xmlrpc 2015-08-25 05:44:11 UTC
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7
  OpenStack 5 for RHEL 6

Via RHSA-2015:1685 https://rhn.redhat.com/errata/RHSA-2015-1685.html

Comment 12 Garth Mollett 2015-08-25 07:21:10 UTC
Created python-keystoneclient tracking bugs for this issue:

Affects: openstack-rdo [bug 1256638]


Note You need to log in before you can comment on or make changes to this bug.