High severityNVD Advisory· Published Sep 5, 2012· Updated Apr 29, 2026
CVE-2012-3542
CVE-2012-3542
Description
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
keystonePyPI | < 2012.1 | 2012.1 |
Affected products
2Patches
2c13d0ba606f7Require authz to update user's tenant (bug 1040626)
1 file changed · +1 −0
keystone/identity/core.py+1 −0 modified@@ -515,6 +515,7 @@ def set_user_password(self, context, user_id, user): def update_user_tenant(self, context, user_id, user): """Update the default tenant.""" + self.assert_admin(context) # ensure that we're a member of that tenant tenant_id = user.get('tenantId') self.identity_api.add_user_to_tenant(context, tenant_id, user_id)
5438d3b5a219Require authz to update user's tenant (bug 1040626)
1 file changed · +1 −0
keystone/identity/core.py+1 −0 modified@@ -436,6 +436,7 @@ def set_user_password(self, context, user_id, user): def update_user_tenant(self, context, user_id, user): """Update the default tenant.""" + self.assert_admin(context) # ensure that we're a member of that tenant tenant_id = user.get('tenantId') self.identity_api.add_user_to_tenant(context, tenant_id, user_id)
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
15- github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155nvdPatchWEB
- github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aanvdPatchWEB
- secunia.com/advisories/50467nvdVendor Advisory
- secunia.com/advisories/50494nvdVendor Advisory
- github.com/advisories/GHSA-gf2q-j2qq-pjf2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2012-3542ghsaADVISORY
- www.openwall.com/lists/oss-security/2012/08/30/6nvdWEB
- www.ubuntu.com/usn/USN-1552-1nvdWEB
- bugs.launchpad.net/keystone/+bug/1040626nvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2012-19.yamlghsaWEB
- lists.launchpad.net/openstack/msg16282.htmlnvdWEB
- web.archive.org/web/20121114023909/http://www.securityfocus.com/bid/55326ghsaWEB
- web.archive.org/web/20140802052724/http://secunia.com/advisories/50467ghsaWEB
- web.archive.org/web/20140804204333/http://secunia.com/advisories/50494ghsaWEB
- www.securityfocus.com/bid/55326nvd
News mentions
0No linked articles in our index yet.