CVE-2017-2673

An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
References
Link Resource
http://seclists.org/oss-sec/2017/q2/125 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/98032 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1461 Vendor Advisory
https://access.redhat.com/errata/RHSA-2017:1597 Vendor Advisory
https://bugs.launchpad.net/keystone/+bug/1677723 Exploit Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2673 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

History

04 Aug 2021, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:openstack:10.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

Information

Published : 2018-07-19 13:29

Updated : 2024-02-04 20:03


NVD link : CVE-2017-2673

Mitre link : CVE-2017-2673

CVE.ORG link : CVE-2017-2673


JSON object : View

Products Affected

redhat

  • openstack
CWE
CWE-863

Incorrect Authorization