[Openstack-security] [Bug 1460024] Re: Service can create trust using received token
David Chadwick
d.w.chadwick at kent.ac.uk
Mon Jun 1 20:32:47 UTC 2015
I think it may be worse than this. I think the delegated trust can have
escalated privileges, e.g. be given the admin role even though the user
does not have this. Can you check it?
David
On 01/06/2015 20:26, Jeremy Stanley wrote:
> I've switched this bug to public and added a security tag in case
> someone wants to make sure it's a behavior we have documented clearly
> (in Keystone's docs, deployment manuals, security guide, OSSN,
> wherever).
>
> ** Changed in: ossa
> Status: Incomplete => Won't Fix
>
> ** Description changed:
>
> - This issue is being treated as a potential security risk under embargo.
> - Please do not make any public mention of embargoed (private) security
> - vulnerabilities before their coordinated publication by the OpenStack
> - Vulnerability Management Team in the form of an official OpenStack
> - Security Advisory. This includes discussion of the bug or associated
> - fixes in public forums such as mailing lists, code review systems and
> - bug trackers. Please also avoid private disclosure to other individuals
> - not already approved for access to this information, and provide this
> - same reminder to those who are made aware of the issue prior to
> - publication. All discussion should remain confined to this private bug
> - report, and any proposed fixes should be added to the bug as
> - attachments.
> -
> It seems possible for a service to create a trust using a token supplied
> by client on an API call.
>
> Use-case:
>
> 1. User uses login/password to get a token from keystone.
> 2. User creates a client of a service providing the token.
> 3. Client uses service API providing the token.
> 4. Service creates a trust allowing it to impersonate the user at any time.
> 5. The trust is created and the user doesn't know about it.
>
> Don't know whether it bug or a feature, but it doesn't look legitimate
> to me.
>
> ** Information type changed from Private Security to Public
>
> ** Tags added: security
>
More information about the Openstack-security
mailing list