CVE-2013-2104

EUVD-2014-0091
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:S/C:N/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
Affected Products (NVD)
VendorProductVersion
openstackpython-keystoneclient
𝑥
≤ 0.2.3
openstackpython-keystoneclient
0.2.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
keystone
bookworm
2:22.0.0-2
fixed
bullseye
2:18.0.0-3+deb11u1
fixed
sid
2:26.0.0-1
fixed
trixie
2:26.0.0-1
fixed
wheezy
not-affected
python-keystoneclient
bookworm
1:5.0.1-3
fixed
bullseye
1:4.1.1-2
fixed
sid
1:5.5.0-2
fixed
trixie
1:5.5.0-2
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
keystone
lucid
dne
precise
not-affected
quantal
Fixed 2012.2.4-0ubuntu3.1
released
raring
not-affected
python-keystoneclient
lucid
dne
precise
not-affected
quantal
not-affected
raring
Fixed 1:0.2.3-0ubuntu2.2
released
Common Weakness Enumeration