CVE-2020-12691

NameCVE-2020-12691
DescriptionAn issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4679-1
Debian Bugs959900

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
keystone (PTS)bullseye2:18.0.0-3+deb11u1fixed
bookworm2:22.0.0-2fixed
sid, trixie2:26.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
keystonesourcejessie(unfixed)end-of-life
keystonesourcestretch(unfixed)end-of-life
keystonesourcebuster2:14.2.0-0+deb10u1DSA-4679-1
keystonesource(unstable)2:17.0.0~rc2-1959900

Notes

[stretch] - keystone <end-of-life> (Not supported in stretch LTS)
[jessie] - keystone <end-of-life> (Not supported in Jessie LTS)
https://bugs.launchpad.net/keystone/+bug/1872733
https://www.openwall.com/lists/oss-security/2020/05/06/5

Search for package or bug name: Reporting problems