A context confusion vulnerability was identified in Keystone authtoken middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches "thread" to use eventlet. Only keystone middleware setups using authtoken with memcache are vulnerable.
{
    "nvd_published_at": "2014-04-15T14:55:00Z",
    "severity": "LOW",
    "github_reviewed_at": "2023-08-03T23:09:34Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-522"
    ]
}