Learn about CVE-2019-19687 affecting OpenStack Keystone versions 15.0.0 and 16.0.0. Discover how unauthorized users can access sensitive credentials, leading to potential data leakage and privacy risks.
OpenStack Keystone versions 15.0.0 and 16.0.0 are affected by a vulnerability in the list credentials API that can lead to data leakage. Users with a role on a project can access the /v3/credentials API and view other users' credentials when enforce_scope is set to false, potentially exposing sensitive information like Time-based One Time Passwords (TOTP).
Understanding CVE-2019-19687
This CVE involves a security issue in OpenStack Keystone versions 15.0.0 and 16.0.0 that allows unauthorized access to user credentials.
What is CVE-2019-19687?
The vulnerability in the list credentials API of OpenStack Keystone versions 15.0.0 and 16.0.0 enables users with a project role to view credentials of other users when enforce_scope is disabled, leading to potential data leakage.
The Impact of CVE-2019-19687
The vulnerability can result in the exposure of sensitive information such as TOTP used for sign-on, posing a risk to data confidentiality and user privacy.
Technical Details of CVE-2019-19687
OpenStack Keystone CVE-2019-19687 involves the following technical aspects:
Vulnerability Description
The list credentials API in OpenStack Keystone versions 15.0.0 and 16.0.0 allows unauthorized users to access and view other users' credentials when enforce_scope is set to false, potentially leading to data leakage.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2019-19687, consider the following mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates