[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-16613 -- swauth

ID: oval:org.secpod.oval:def:1900291Date: (C)2019-03-22   (M)2023-12-20
Class: VULNERABILITYFamily: unix




An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI.This allows attackers to bypass authentication by inserting a token into anX-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack projectteam.

Platform:
Ubuntu 16.04
Ubuntu 14.04
Product:
swauth
Reference:
CVE-2017-16613
CVE    1
CVE-2017-16613
CPE    3
cpe:/o:ubuntu:ubuntu_linux:16.04
cpe:/o:ubuntu:ubuntu_linux:14.04
cpe:/a:swauth_project:swauth

© SecPod Technologies