GHSA-qhq8-xwqv-pvv9

Suggest an improvement
Source
https://github.com/advisories/GHSA-qhq8-xwqv-pvv9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qhq8-xwqv-pvv9/GHSA-qhq8-xwqv-pvv9.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-qhq8-xwqv-pvv9
Aliases
Published
2022-05-17T00:16:14Z
Modified
2024-10-28T15:08:23.286991Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenStack Swauth object/proxy server writing Auth Token to log file
Details

An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.

Database specific
{
    "nvd_published_at": "2017-11-21T13:29:00Z",
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-01T11:24:02Z"
}
References

Affected packages

PyPI / swauth

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

1.*

1.0.8
1.1.0
1.2.0