{"id":"PYSEC-2014-108","details":"The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.","aliases":["CVE-2014-5252","GHSA-v8fq-gq9j-3v7h"],"modified":"2024-11-25T22:42:16.430795Z","published":"2014-08-25T14:55:00Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/08/15/6"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2324-1"},{"type":"WEB","url":"https://bugs.launchpad.net/keystone/+bug/1348820"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1121.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1122.html"}],"affected":[{"package":{"name":"keystone","ecosystem":"PyPI","purl":"pkg:pypi/keystone"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.0a0"}]}],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/keystone/PYSEC-2014-108.yaml"}}],"schema_version":"1.7.3"}