HIGH8.8
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
CVSS 2.0LOW 3.5
CVSS:2.0/AV:N/AC:M/Au:S/C:P/I:N/A:NCVSS 3.xHIGH 8.8
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HReferences
- http://www.openwall.com/lists/oss-security/2019/12/11/8
- https://access.redhat.com/errata/RHSA-2019:4358
- https://bugs.launchpad.net/keystone/+bug/1855080
- https://review.opendev.org/#/c/697355/
- https://review.opendev.org/#/c/697611/
- https://review.opendev.org/#/c/697731/
- https://security.openstack.org/ossa/OSSA-2019-006.html
- https://usn.ubuntu.com/4262-1/
- http://www.openwall.com/lists/oss-security/2019/12/11/8
- https://access.redhat.com/errata/RHSA-2019:4358
- https://bugs.launchpad.net/keystone/+bug/1855080
- https://review.opendev.org/#/c/697355/
- https://review.opendev.org/#/c/697611/
- https://review.opendev.org/#/c/697731/
- https://security.openstack.org/ossa/OSSA-2019-006.html
- https://usn.ubuntu.com/4262-1/