OpenStack Keystone EC2-style Tokens Validation Privilage Escalation Vulnerability

Attackers can exploit this issue using standard tools.


 

Privacy Statement
Copyright 2010, SecurityFocus