Search for packages
| purl | pkg:pypi/keystone@0 |
| Tags | Ghost |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-vr8z-xkg6-kuhy
Aliases: CVE-2012-5571 GHSA-qvpr-qm6w-6rcc PYSEC-2012-35 |
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. |
Affected by 0 other vulnerabilities. |
|
VCID-wc5s-25xb-rqaa
Aliases: CVE-2020-12692 GHSA-rqw2-hhrf-7936 PYSEC-2020-56 |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. |
Affected by 8 other vulnerabilities. Affected by 10 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-04T14:32:34.520303+00:00 | GHSA Importer | Affected by | VCID-wc5s-25xb-rqaa | https://github.com/advisories/GHSA-rqw2-hhrf-7936 | 38.1.0 |
| 2026-04-04T14:31:13.886261+00:00 | GHSA Importer | Affected by | VCID-vr8z-xkg6-kuhy | https://github.com/advisories/GHSA-qvpr-qm6w-6rcc | 38.1.0 |