Search for packages
| purl | pkg:pypi/python-keystoneclient@0.2.3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-44u3-6h7t-dbah
Aliases: CVE-2014-0105 GHSA-gwvq-rgqf-993f PYSEC-2014-70 |
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached." |
Affected by 2 other vulnerabilities. |
|
VCID-5st1-zx32-3yfw
Aliases: CVE-2015-1852 GHSA-p9wq-mjh8-q72m PYSEC-2015-30 PYSEC-2015-31 |
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. |
Affected by 0 other vulnerabilities. |
|
VCID-5tkb-w761-4qc6
Aliases: CVE-2013-2030 GHSA-pxxv-rv32-2qgv PYSEC-2013-45 |
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. |
Affected by 6 other vulnerabilities. |
|
VCID-79rs-7766-4ycf
Aliases: CVE-2014-7144 GHSA-7f2c-vp52-gmfw PYSEC-2014-26 PYSEC-2014-71 |
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-8yta-5ta1-fkfm
Aliases: CVE-2013-2166 GHSA-c3xq-cj8f-7829 PYSEC-2019-197 |
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass |
Affected by 4 other vulnerabilities. |
|
VCID-d5eh-h7qr-9kbt
Aliases: CVE-2013-2167 GHSA-9vg3-cf92-h2h7 PYSEC-2019-161 |
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass |
Affected by 4 other vulnerabilities. |
|
VCID-p776-3n3m-wkhz
Aliases: CVE-2013-2104 GHSA-4rrr-j7ff-r844 PYSEC-2014-69 |
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. |
Affected by 6 other vulnerabilities. |
|
VCID-ryxy-ymcn-3bhr
Aliases: CVE-2013-2013 GHSA-8q2m-pwxf-jc7g PYSEC-2013-24 |
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process. |
Affected by 6 other vulnerabilities. |
|
VCID-uexc-7rt7-hbgx
Aliases: CVE-2013-2255 GHSA-qh2x-hpf9-cf2g |
OpenStack Keystone and other components vulnerable to Improper Certificate Validation HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. |
Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||