Man-in-the-Middle (MitM) Affecting python-keystoneclient package, versions [,1.4.0)
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.38% (73rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PYTHONKEYSTONECLIENT-40715
- published 4 Dec 2017
- disclosed 17 Apr 2015
- credit Brant Knudson
Introduced: 17 Apr 2015
CVE-2015-1852 Open this link in a new tabHow to fix?
Upgrade python-keystoneclient
to version 1.4.0 or higher.
Overview
Affected versions of python-keystoneclient
are vulnerable to Man-in-the-Middle (MitM) attacks.
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.