Miggo Logo

CVE-2020-12692:
OpenStack Keystone does not check signature TTL of the EC2 credential auth method

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.31006%
Published
5/24/2022
Updated
9/27/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
keystonepip>= 16.0.0.0rc1, < 16.0.016.0.0
keystonepip>= 0, < 15.0.115.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing timestamp validation in the EC2 credential authentication flow. The commit diff shows the fix added a '_check_timestamp' function and called it from 'handle_authenticate'. In vulnerable versions, this validation was absent in the authentication handler, allowing replay of valid signatures indefinitely. The 'handle_authenticate' method is the entry point for EC2 credential validation and would have processed requests without TTL checks prior to the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in Op*nSt**k K*yston* ***or* **.*.*, *n* **.*.*. T** *** *PI *o*sn't **v* * si*n*tur* TTL ****k *or *WS Si*n*tur* V*. *n *tt**k*r **n sni** t** *ut*oriz*tion *****r, *n* t**n us* it to r*issu* *n Op*nSt**k tok*n *n unlimit** n

Reasoning

T** vuln*r**ility st*ms *rom missin* tim*st*mp v*li**tion in t** *** *r***nti*l *ut**nti**tion *low. T** *ommit *i** s*ows t** *ix ***** * '_****k_tim*st*mp' *un*tion *n* **ll** it *rom '**n*l*_*ut**nti**t*'. In vuln*r**l* v*rsions, t*is v*li**tion w