OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforcescope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforcescope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:9.3.0-0ubuntu3.2",
"binary_name": "keystone"
},
{
"binary_version": "2:9.3.0-0ubuntu3.2",
"binary_name": "keystone-doc"
},
{
"binary_version": "2:9.3.0-0ubuntu3.2",
"binary_name": "python-keystone"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:13.0.2-0ubuntu1",
"binary_name": "keystone"
},
{
"binary_version": "2:13.0.2-0ubuntu1",
"binary_name": "keystone-doc"
},
{
"binary_version": "2:13.0.2-0ubuntu1",
"binary_name": "python-keystone"
}
]
}