python-keystoneclient 0.2.2

CPE Details

python-keystoneclient 0.2.2
0.2.2
2013-10-02
15h09 +00:00
2013-10-02
16h30 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:openstack:python-keystoneclient:0.2.2:*:*:*:*:*:*:*

Informations

Vendor

openstack

Product

python-keystoneclient

Version

0.2.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2015-1852 2015-04-17 15h00 +00:00 The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
4.3
CVE-2014-7144 2014-10-02 12h00 +00:00 OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
4.3
CVE-2014-0105 2014-04-15 12h00 +00:00 The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."
6
CVE-2013-2104 2014-01-21 17h00 +00:00 python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
5.5
CVE-2013-2013 2013-10-01 18h00 +00:00 The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
2.1