CVE-2019-3683
Severity
8.8HIGH
EPSS
0.3%
top 49.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 17
Latest updateMay 24
Description
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
▶CVEListV5suse/suse_openstack_cloud_8keystone-json-assignment — d7888c75505465490250c00cc0ef4bb1af662f9f
🔴Vulnerability Details
2GHSA▶
GHSA-pfwx-2ff5-2g47: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/ke↗2022-05-24
CVEList▶
keystone_json_assignment backend granted access to any project for users in user-project-map.json↗2020-01-17