CVE-2015-1852
Severity
4.3MEDIUM
EPSS
0.2%
top 55.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateMay 17
Description
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
CVSS vector
AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages6 packages
Also affects: Ubuntu Linux 14.04, 15.04
🔴Vulnerability Details
5📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2015-1852 keystonemiddleware/keystoneclient: S3Token TLS cert verification option not honored↗2015-04-07