Vulnerability identifier: #VU27606
Vulnerability risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-325
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenStack Keystone
Client/Desktop applications /
Other client software
Vendor: Openstack
Description
The vulnerability allows a remote attacker to intercept and decrypt sensitive information.
The vulnerability exists due to the EC2 API does not have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
Mitigation
Install update from vendor's website.
Vulnerable software versions
OpenStack Keystone: 8.0.0 - 2015.1.4
External links
http://bugs.launchpad.net/keystone/+bug/1872737
http://www.openwall.com/lists/oss-security/2020/05/06/4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.