OpenStack Keystone Token Validation Multiple Security Bypass Vulnerabilities

Keystone is prone to multiple security-bypass vulnerabilities.

Successful exploits may allow authenticated attackers to bypass certain intended security restrictions and perform unauthorized actions which may aid in launching further attacks.


 

Privacy Statement
Copyright 2010, SecurityFocus