CVE-2020-12691
HIGHOpenStack Keystone <16.0.0 - Privilege Escalation
Title source: llmDescription
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
References (7)
Scores
CVSS v3
8.8
EPSS
0.0357
EPSS Percentile
87.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-863
Status
published
Affected Products (4)
openstack/keystone
< 15.0.1
openstack/keystone
canonical/ubuntu_linux
pypi/keystone
< 15.0.1PyPI
Timeline
Published
May 07, 2020
Tracked Since
Feb 18, 2026