Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keystone
  4. ›
  5. CVE-2020-12691

CVE-2020-12691: OpenStack Keystone V3 /credentials endpoint policy logic allows to change credentials owner or target project ID

May 24, 2022 (updated September 27, 2024)

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

References

  • bugs.launchpad.net/keystone/+bug/1872733
  • github.com/advisories/GHSA-4427-7f3w-mqv6
  • github.com/openstack/keystone
  • github.com/openstack/keystone/commit/37e9907a176dad6843819b1bec4946c3aecc4548
  • github.com/openstack/keystone/commit/40cbb7bebd50276412daa1981ff5a7c7b3b899a5
  • github.com/openstack/keystone/commit/95b2bbeab113d9f04d1c81f7f1b48bf692bce979
  • github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2020-55.yaml
  • lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E
  • lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2020-12691
  • security.openstack.org/ossa/OSSA-2020-004.html
  • usn.ubuntu.com/4480-1
  • www.openwall.com/lists/oss-security/2020/05/06/5

Code Behaviors & Features

Detect and mitigate CVE-2020-12691 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 15.0.1, all versions starting from 16.0.0 before 16.0.1, version 16.0.0

Fixed versions

  • 15.0.1
  • 16.0.1

Solution

Upgrade to versions 15.0.1, 16.0.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-311: Missing Encryption of Sensitive Data
  • CWE-863: Incorrect Authorization

Source file

pypi/keystone/CVE-2020-12691.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:47 +0000.