OpenStack Keystone EC2-style Tokens Validation Privilage Escalation Vulnerability

Keystone is prone to a privilege-escalation vulnerability.

Successful exploits may allow authenticated attackers to gain escalated privileges and perform unauthorized actions which may aid in launching further attacks.

OpenStack Keystone 2013.2.0 and above are vulnerable.


 

Privacy Statement
Copyright 2010, SecurityFocus