CVE-2019-3683

Severity
8.8HIGH
EPSS
0.3%
top 49.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 17
Latest updateMay 24

Description

The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5suse/suse_openstack_cloud_8keystone-json-assignmentd7888c75505465490250c00cc0ef4bb1af662f9f

🔴Vulnerability Details

2
GHSA
GHSA-pfwx-2ff5-2g47: The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/ke2022-05-24
CVEList
keystone_json_assignment backend granted access to any project for users in user-project-map.json2020-01-17

💥Exploits & PoCs

3
Exploit-DB
Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)2020-03-09
Exploit-DB
Bematech Printer MP-4200 - Denial of Service2019-11-12
Exploit-DB
HumHub 1.3.12 - Cross-Site Scripting2019-04-30

📋Vendor Advisories

20
Red Hat
chromium-browser: Out-of-bounds write in V82019-04-30
Red Hat
chromium-browser: Use-after-free in IndexedDB2019-04-30
Red Hat
chromium-browser: Integer overflow in PDFium2019-03-12
Red Hat
chromium-browser: CSP bypass with blob URL2019-03-12
Red Hat
chromium-browser: CSP bypass with Javascript URLs2019-03-12
CVE-2019-3683 (HIGH CVSS 8.8) | The keystone-json-assignment packag | cvebase.io