CVE-2020-12691
Severity
8.8HIGH
EPSS
3.6%
top 12.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 7
Latest updateMay 24
Description
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
Also affects: Ubuntu Linux 18.04
Patches
🔴Vulnerability Details
5📋Vendor Advisories
3💬Community
2Bugzilla▶
CVE-2020-12691 openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID [openstack-rdo]↗2020-05-06
Bugzilla▶
CVE-2020-12691 openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID↗2020-05-01