OpenStack Keystone Token Revocation Failure Security Bypass Vulnerability

Keystone is prone to a security-bypass vulnerability.

Successful exploits may allow authenticated attackers to bypass certain intended security restrictions and perform unauthorized actions which may aid in launching further attacks.

Keystone (Folsom and Grizzly) is affected.


 

Privacy Statement
Copyright 2010, SecurityFocus