{"containers":{"cna":{"title":"Openstack keystone: openstack keystone: authorization bypass via improper ec2 token handling","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access."}],"affected":[{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 13 (Queens)","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"redhat-user-workloads/openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:13"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 16.2","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:16.2"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 16.2","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"redhat-user-workloads/openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:16.2"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 17.1","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:17.1"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 17.1","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"redhat-user-workloads/openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:17.1"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 18.0","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:18.0"]},{"vendor":"Red Hat","product":"Red Hat OpenStack Platform 18.0","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"redhat-user-workloads/openstack-keystone","defaultStatus":"affected","cpes":["cpe:/a:redhat:openstack:18.0"]}],"references":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html"},{"url":"http://secunia.com/advisories/51423"},{"url":"http://secunia.com/advisories/51436"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6"},{"url":"http://www.securityfocus.com/bid/56726"},{"url":"http://www.ubuntu.com/usn/USN-1641-1"},{"url":"https://access.redhat.com/security/cve/CVE-2012-5571","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugs.launchpad.net/keystone/+bug/1064914"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333"},{"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b"},{"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19"},{"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653"}],"datePublic":"2012-12-18T01:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"Authorization Bypass Through User-Controlled Key","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-639: Authorization Bypass Through User-Controlled Key","timeline":[{"lang":"en","time":"2026-04-02T15:02:50.229Z","value":"Reported to Red Hat."},{"lang":"en","time":"2012-12-18T01:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-04-07T06:55:17.789Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T21:14:15.748Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19"},{"name":"RHSA-2012:1557","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html"},{"name":"RHSA-2012:1556","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html"},{"name":"[oss-security] 20121128 [OSSA 2012-018] EC2-style credentials invalidation issue (CVE-2012-5571)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5"},{"name":"USN-1641-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1641-1"},{"name":"keystone-tenant-sec-bypass(80333)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugs.launchpad.net/keystone/+bug/1064914"},{"name":"[oss-security] 20121128 [OSSA 2012-019] Extension of token validity through token chaining (CVE-2012-5563)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653"},{"name":"51423","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/51423"},{"name":"56726","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/56726"},{"name":"51436","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/51436"},{"name":"FEDORA-2012-19341","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-5571","datePublished":"2012-12-18T01:00:00.000Z","dateReserved":"2012-10-24T00:00:00.000Z","dateUpdated":"2026-04-07T06:55:17.789Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}