Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:pypi/keystone@0
purl pkg:pypi/keystone@0
Tags Ghost
Next non-vulnerable version 26.1.1
Latest non-vulnerable version 28.0.1
Risk 3.1
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-vr8z-xkg6-kuhy
Aliases:
CVE-2012-5571
GHSA-qvpr-qm6w-6rcc
PYSEC-2012-35
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
8.0.0a0
Affected by 0 other vulnerabilities.
VCID-wc5s-25xb-rqaa
Aliases:
CVE-2020-12692
GHSA-rqw2-hhrf-7936
PYSEC-2020-56
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
15.0.1
Affected by 8 other vulnerabilities.
16.0.0
Affected by 10 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-04T14:32:34.520303+00:00 GHSA Importer Affected by VCID-wc5s-25xb-rqaa https://github.com/advisories/GHSA-rqw2-hhrf-7936 38.1.0
2026-04-04T14:31:13.886261+00:00 GHSA Importer Affected by VCID-vr8z-xkg6-kuhy https://github.com/advisories/GHSA-qvpr-qm6w-6rcc 38.1.0