A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-0016 | OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. |
Github GHSA |
GHSA-qvpr-qm6w-6rcc | OpenStack Keystone intended authorization restrictions bypass |
Ubuntu USN |
USN-1641-1 | OpenStack Keystone vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. | A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access. |
| Title | OpenStack: Keystone EC2-style credentials invalidation issue | Openstack keystone: openstack keystone: authorization bypass via improper ec2 token handling |
| Weaknesses | CWE-639 | |
| CPEs | cpe:/a:redhat:openstack:13 cpe:/a:redhat:openstack:16.2 cpe:/a:redhat:openstack:17.1 cpe:/a:redhat:openstack:18.0 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-07T06:55:17.789Z
Reserved: 2012-10-24T00:00:00.000Z
Link: CVE-2012-5571
No data.
Status : Deferred
Published: 2012-12-18T01:55:03.570
Modified: 2026-04-07T07:16:22.450
Link: CVE-2012-5571
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN