Description
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-0028 | The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. |
Github GHSA |
GHSA-p9wq-mjh8-q72m | OpenStack keystonemiddleware and python-keystoneclient vulnerable to man-in-the-middle attacks |
Ubuntu USN |
USN-2705-1 | Keystone vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:54:16.294Z
Reserved: 2015-02-17T00:00:00.000Z
Link: CVE-2015-1852
No data.
Status : Modified
Published: 2015-04-17T17:59:02.653
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-1852
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN