Vulnerability Details CVE-2014-3621
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.7%
CVSS Severity
CVSS v2 Score 4.0
Products affected by CVE-2014-3621
-
cpe:2.3:a:openstack:keystone:2013.2
-
cpe:2.3:a:openstack:keystone:2013.2.1
-
cpe:2.3:a:openstack:keystone:2013.2.2
-
cpe:2.3:a:openstack:keystone:2014.1
-
cpe:2.3:a:openstack:keystone:2014.1.1
-
cpe:2.3:a:openstack:keystone:2014.1.2
-
cpe:2.3:a:redhat:openstack:4.0
-
cpe:2.3:a:redhat:openstack:5.0
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:redhat:enterprise_linux:6.0
-
cpe:2.3:o:redhat:enterprise_linux:7.0