OpenStack Keystone Tokens Validation Security Bypass Vulnerability

Keystone is prone to a security-bypass vulnerability.

Successful exploits may allow authenticated attackers to bypass certain intended security restrictions and perform unauthorized actions which may aid in launching further attacks.

The following versions are affected:
Keystone (Folsom)
Keystone (Havana)
Keystone (Grizzly)


 

Privacy Statement
Copyright 2010, SecurityFocus