CVE-2020-12692

medium

Description

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

References

https://www.openwall.com/lists/oss-security/2020/05/06/4

https://usn.ubuntu.com/4480-1/

https://security.openstack.org/ossa/OSSA-2020-003.html

https://bugs.launchpad.net/keystone/+bug/1872737

http://www.openwall.com/lists/oss-security/2020/05/07/1

Details

Source: Mitre, NVD

Published: 2020-05-07

Updated: 2022-04-27

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Severity: Medium