Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keystone
  4. ›
  5. CVE-2014-3621

CVE-2014-3621: OpenStack Identity Keystone Exposure of Sensitive Information

May 13, 2022 (updated May 14, 2024)

The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by “$(admin_token)” in the publicurl endpoint field.

References

  • access.redhat.com/errata/RHSA-2014:1688
  • access.redhat.com/errata/RHSA-2014:1789
  • access.redhat.com/errata/RHSA-2014:1790
  • access.redhat.com/security/cve/CVE-2014-3621
  • bugs.launchpad.net/keystone/+bug/1354208
  • bugzilla.redhat.com/show_bug.cgi?id=1139937
  • github.com/advisories/GHSA-8v8f-vc72-pmhc
  • github.com/openstack/keystone/commit/2989ff257e4fde6a168e25b926805e700406aa80
  • github.com/openstack/keystone/commit/52714633c9a4dae5e60279217090859aa6dbcb4f
  • nvd.nist.gov/vuln/detail/CVE-2014-3621

Code Behaviors & Features

Detect and mitigate CVE-2014-3621 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.0.0a0

Fixed versions

  • 8.0.0a0

Solution

Upgrade to version 8.0.0a0 or above.

Impact 4 MEDIUM

AV:N/AC:L/Au:S/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

pypi/keystone/CVE-2014-3621.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:41 +0000.