PKI Token Revocation Bypass (CVE-2015-7546)

Bug #1526823 reported by Adam Heczko
264
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Mirantis OpenStack
Invalid
High
MOS Keystone
5.1.x
Invalid
High
MOS Maintenance
6.0.x
Invalid
High
MOS Maintenance
6.1.x
Invalid
High
MOS Maintenance
7.0.x
Invalid
High
MOS Maintenance

Bug Description

Problem description:

A keystone token which has been revoked can still be used by manipulating particular byte fields within the token.
When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1].

It is suggested that the revocation should be changed to only check the token's inner ID.

[1] http://paste.openstack.org/show/436516/

Upstream bug report:
https://bugs.launchpad.net/keystone/+bug/1490804

OSSN notice:
https://wiki.openstack.org/wiki/OSSN/OSSN-0062

Solution proposal:
Backport fix from the upstream.
Warn customers about issue and potential risks.

CVE References

description: updated
Changed in mos:
milestone: none → 8.0
importance: Undecided → Medium
importance: Medium → High
assignee: nobody → MOS Keystone (mos-keystone)
Revision history for this message
Boris Bobrov (bbobrov) wrote :

> Backport fix from the upstream.

We don't use PKI by default.

Changed in mos:
status: New → Invalid
information type: Public Security → Private Security
Revision history for this message
Denis Meltsaykin (dmeltsaykin) wrote :

As per comment #1 the default MOS installations are not affected, setting this as Invalid for all the Update-branches.

Revision history for this message
Adam Heczko (aheczko-mirantis) wrote :

As it was communicated, we don't support and use PKI(z) tokens.
Appropriate release notes documentation is required to clarify it.

tags: added: release-notes
information type: Private Security → Public Security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.