CVE-2012-4457: OpenStack Keystone Token authorization for a user in a disabled tenant is allowed
4
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67311%
CWE
Published
5/14/2022
Updated
1/12/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Keystone | pip | < 8.0.0a0 | 8.0.0a0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing tenant status checks during token issuance. The patch adds two explicit checks in keystone/service.py's authenticate method:
- A check in the initial user/tenant validation block
- A secondary check after metadata handling These additions confirm the original function lacked proper tenant enablement validation. The test case in tests/test_keystoneclient.py demonstrates the exploit scenario where disabled tenant authentication should fail, which only works after the tenant status check was implemented.