VYPR

PyPI package

keystone

pkg:pypi/keystone

Vulnerabilities (39)

  • CVE-2026-43001HigMay 1, 2026
    affected >= 13.0.0, <= 29.0.1

    An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted app

  • CVE-2026-40683HigApr 14, 2026
    affected < 28.0.1fixed 28.0.1

    In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only performed string-to-boolean co

  • CVE-2026-33551LowApr 10, 2026
    affected >= 14.0.0, < 26.1.1fixed 26.1.1

    An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with o

  • CVE-2025-65073HigNov 17, 2025
    affected < 26.0.1fixed 26.0.1

    OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.

  • CVE-2021-3563Aug 26, 2022
    affected <= 21.0.0

    A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integri

  • CVE-2021-38155Aug 6, 2021
    affected >= 10.0, < 16.0.2fixed 16.0.2

    OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, an

  • CVE-2020-12689May 6, 2020
    affected < 15.0.1fixed 15.0.1

    An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer rol

  • CVE-2020-12690May 6, 2020
    affected < 15.0.1fixed 15.0.1

    An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had fo

  • CVE-2020-12691May 6, 2020
    affected < 15.0.1fixed 15.0.1

    An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade

  • CVE-2020-12692May 6, 2020
    affected >= 16.0.0.0rc1, < 16.0.0fixed 16.0.0

    An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

  • CVE-2019-19687Dec 9, 2019
    affected >= 15.0.0, < 15.0.1fixed 15.0.1

    OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other user

  • CVE-2013-2255Nov 1, 2019
    affected < 8.0.0a0fixed 8.0.0a0

    HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.

  • CVE-2017-2673Jul 19, 2018
    affected >= 9.0.0, <= 9.3.0

    An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.

  • CVE-2016-4911MedJun 13, 2016
    affected >= 9.0.0, < 9.0.1fixed 9.0.1

    The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token.

  • CVE-2015-7546HigFeb 3, 2016
    affected >= 9.0.0.0b1, < 9.0.0.0b2fixed 9.0.0.0b2

    The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI

  • CVE-2015-3646May 12, 2015
    affected >= 2011.3, < 2014.1.5fixed 2014.1.5

    OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.

  • CVE-2014-0204Nov 3, 2014
    affected < 8.0.0a0fixed 8.0.0a0

    OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID.

  • CVE-2014-3621Oct 2, 2014
    affected < 8.0.0a0fixed 8.0.0a0

    The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.

  • CVE-2014-5253Aug 25, 2014
    affected < 8.0.0a0fixed 8.0.0a0

    OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.

  • CVE-2014-5252Aug 25, 2014
    affected < 8.0.0a0fixed 8.0.0a0

    The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to

Page 1 of 2