{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:42:29.080","vulnerabilities":[{"cve":{"id":"CVE-2012-5571","sourceIdentifier":"secalert@redhat.com","published":"2012-12-18T01:55:03.570","lastModified":"2026-04-07T07:16:22.450","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access."},{"lang":"es","value":"OpenStack Keystone Essex (2012.1) and Folsom (2012.2) no controlan correctamente los token EC2 cuando la función de usuario se ha eliminado de un inquilino, lo que permite a usuarios autenticados remotamente eludir las restricciones previstas al aprovechar un token para la función de usuario eliminado."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*","matchCriteriaId":"E5FDB43F-B315-4F68-9D86-B644F2D4DF9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*","matchCriteriaId":"E76B76AB-D744-4163-8615-7BA18ABB1347"}]}]}],"references":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/51423","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/51436","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/56726","source":"secalert@redhat.com"},{"url":"http://www.ubuntu.com/usn/USN-1641-1","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2012-5571","source":"secalert@redhat.com"},{"url":"https://bugs.launchpad.net/keystone/+bug/1064914","source":"secalert@redhat.com","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333","source":"secalert@redhat.com"},{"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b","source":"secalert@redhat.com","tags":["Patch"]},{"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19","source":"secalert@redhat.com","tags":["Patch"]},{"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094286.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1556.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1557.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/51423","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/51436","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/28/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/56726","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-1641-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugs.launchpad.net/keystone/+bug/1064914","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80333","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/openstack/keystone/commit/37308dd4f3e33f7bd0f71d83fd51734d1870713b","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/openstack/keystone/commit/8735009dc5b895db265a1cd573f39f4acfca2a19","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/openstack/keystone/commit/9d68b40cb9ea818c48152e6c712ff41586ad9653","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}