Openstack Python-Keystoneclient vulnerabilities

7 known vulnerabilities affecting openstack/python-keystoneclient.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2MEDIUM4LOW1

Vulnerabilities

Page 1 of 1
CVE-2013-2167CRITICALCVSS 9.8≥ 0.2.3, ≤ 0.2.52019-12-10
CVE-2013-2167 [CRITICAL] CWE-345 CVE-2013-2167: python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
nvd
CVE-2013-2166CRITICALCVSS 9.8≥ 0.2.3, ≤ 0.2.52019-12-10
CVE-2013-2166 [CRITICAL] CWE-326 CVE-2013-2166: python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
nvd
CVE-2015-1852MEDIUMCVSS 4.3≤ 1.3.02015-04-17
CVE-2015-1852 [MEDIUM] CVE-2015-1852: The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient befor The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerabil
nvd
CVE-2014-7144MEDIUMCVSS 4.3≤ 0.10.12014-10-02
CVE-2014-7144 [MEDIUM] CWE-310 CVE-2014-7144: OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
nvd
CVE-2014-0105MEDIUMCVSS 6.0≤ 0.4.2v0.2.2+5 more2014-04-15
CVE-2014-0105 [MEDIUM] CWE-255 CVE-2014-0105: The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystonecl The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-mem
nvd
CVE-2013-2104MEDIUMCVSS 5.5≤ 0.2.3v0.2.22014-01-21
CVE-2013-2104 [MEDIUM] CWE-264 CVE-2013-2104: python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
nvd
CVE-2013-2013LOWCVSS 2.1≤ 0.2.3v0.2.22013-10-01
CVE-2013-2013 [LOW] CWE-200 CVE-2013-2013: The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in t The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
nvd