Информационная безопасность
[RU] switch to English


Обход ограничений в OpenStack Keystone
Опубликовано:24 августа 2015 г.
Источник:
SecurityVulns ID:14650
Тип:m-i-t-m
Уровень опасности:
5/10
Описание:Обход проверки сертификата.
CVE:CVE-2015-1852 (The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.)
 CVE-2014-7144 (OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.)
Оригинальный текстdocumentUBUNTU, [USN-2705-1] Keystone vulnerabilities (24.08.2015)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород