{"id":"PYSEC-2014-71","details":"OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.","aliases":["CVE-2014-7144","GHSA-7f2c-vp52-gmfw","PYSEC-2014-26"],"modified":"2023-11-08T03:57:44.312368Z","published":"2014-10-02T14:55:00Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/09/25/51"},{"type":"WEB","url":"https://bugs.launchpad.net/python-keystoneclient/+bug/1353315"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1783.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1784.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/62709"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0020.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2705-1"},{"type":"WEB","url":"http://www.securityfocus.com/bid/69864"}],"affected":[{"package":{"name":"python-keystoneclient","ecosystem":"PyPI","purl":"pkg:pypi/python-keystoneclient"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.11.0"},{"introduced":"1.0"},{"fixed":"1.2.0"}]}],"versions":["0.1.1","0.1.2","0.1.3","0.10.0","0.10.1","0.2.0","0.2.1","0.2.2","0.2.3","0.2.4","0.2.5","0.3.0","0.3.1","0.3.2","0.4.0","0.4.1","0.4.2","0.5.0","0.5.1","0.6.0","0.7.0","0.7.1","0.8.0","0.9.0","1.0.0","1.1.0","1.1.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/python-keystoneclient/PYSEC-2014-71.yaml"}}],"schema_version":"1.7.3"}