{"id":"PYSEC-2013-39","details":"OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.","aliases":["CVE-2013-1865","GHSA-22q6-wwq7-2jj9"],"modified":"2024-11-25T22:42:33.916204Z","published":"2013-03-22T21:55:00Z","references":[{"type":"WEB","url":"https://review.openstack.org/#/c/24906/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/58616"},{"type":"WEB","url":"https://bugs.launchpad.net/keystone/+bug/1129713"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1772-1"},{"type":"WEB","url":"http://osvdb.org/91532"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2013/03/20/13"},{"type":"ADVISORY","url":"http://secunia.com/advisories/52657"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00000.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-0708.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101719.html"}],"affected":[{"package":{"name":"keystone","ecosystem":"PyPI","purl":"pkg:pypi/keystone"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2012.2"},{"fixed":"2012.2.4"}]}],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/keystone/PYSEC-2013-39.yaml"}}],"schema_version":"1.7.3"}