Severity
8.8HIGH
EPSS
1.1%
top 22.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateMay 24

Description

An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDopenstack/keystone< 15.0.1+1
PyPIkeystone16.0.016.0.1+1
Debiankeystone< 2:17.0.0~rc2-1+3
Ubuntukeystone< 2:13.0.4-0ubuntu1

Also affects: Ubuntu Linux 18.04

Patches

🔴Vulnerability Details

5
OSV
OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context2022-05-24
GHSA
OpenStack Keystone EC2 and/or credential endpoints are not protected from a scoped context2022-05-24
OSV
keystone vulnerabilities2020-09-01
OSV
CVE-2020-12689: An issue was discovered in OpenStack Keystone before 152020-05-07
CVEList
CVE-2020-12689: An issue was discovered in OpenStack Keystone before 152020-05-06

📋Vendor Advisories

3
Ubuntu
OpenStack Keystone vulnerabilities2020-09-01
Red Hat
openstack-keystone: EC2 and credential endpoints are not protected from a scoped context2020-05-06
Debian
CVE-2020-12689: keystone - An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any use...2020

💬Community

2
Bugzilla
CVE-2020-12689 openstack-keystone: EC2 and credential endpoints are not protected from a scoped context [openstack-rdo]2020-05-06
Bugzilla
CVE-2020-12689 openstack-keystone: EC2 and credential endpoints are not protected from a scoped context2020-05-01
CVE-2020-12689 (HIGH CVSS 8.8) | An issue was discovered in OpenStac | cvebase.io