{"id":"UBUNTU-CVE-2014-5252","details":"The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.","modified":"2026-02-04T02:42:49.830392Z","published":"2014-08-15T00:00:00Z","related":["USN-2324-1"],"upstream":["CVE-2014-5252"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-5252"},{"type":"REPORT","url":"https://launchpad.net/bugs/1348820"},{"type":"REPORT","url":"https://git.openstack.org/cgit/openstack/keystone/commit/?id=bdb88c662ac2035f9b0d8a229a5db5f60f5f16ae"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2324-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-5252"}],"affected":[{"package":{"name":"keystone","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/keystone@1:2014.1.2.1-0ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2014.1.2.1-0ubuntu1.1"}]}],"versions":["1:2013.2~rc4-0ubuntu1","1:2013.2-0ubuntu1","1:2013.2-0ubuntu1.1","1:2014.1~b1-0ubuntu1","1:2014.1~b2-0ubuntu1","1:2014.1~b3-0ubuntu2","1:2014.1~b3-0ubuntu3","1:2014.1~rc1-0ubuntu1","1:2014.1~rc2-0ubuntu1","1:2014.1-0ubuntu1","1:2014.1.1-0ubuntu1","1:2014.1.2.1-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2014.1.2.1-0ubuntu1.1","binary_name":"keystone"},{"binary_version":"1:2014.1.2.1-0ubuntu1.1","binary_name":"python-keystone"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-5252.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}