CVE-2014-5252
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0029 (0.3%)
Percentil: 52.1%
EPSS: 2026-05-06
Afecta
openstack:keystonecanonical:ubuntu_linuxDescripción técnica
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
Publicada: 25/8/2014, 14:55:07
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://rhn.redhat.com/errata/RHSA-2014-1121.html
- http://rhn.redhat.com/errata/RHSA-2014-1122.html
- http://www.openwall.com/lists/oss-security/2014/08/15/6
- http://www.ubuntu.com/usn/USN-2324-1
- https://bugs.launchpad.net/keystone/+bug/1348820
- http://rhn.redhat.com/errata/RHSA-2014-1121.html
- http://rhn.redhat.com/errata/RHSA-2014-1122.html
- http://www.openwall.com/lists/oss-security/2014/08/15/6