diff options
| author | Amy Fong <amy.fong@windriver.com> | 2014-05-07 14:22:43 -0400 |
|---|---|---|
| committer | Bruce Ashfield <bruce.ashfield@windriver.com> | 2014-05-08 14:30:03 -0400 |
| commit | d679e470b5c3a26eff41d1efb0b1c6500e3fc060 (patch) | |
| tree | 88285392ae8348b46d9fe2ce814850331ec1865d /meta-openstack/recipes-devtools/python/python-keystone | |
| parent | fd1371e01ea808309b76a72cc9a161c72e148279 (diff) | |
| download | meta-cloud-services-d679e470b5c3a26eff41d1efb0b1c6500e3fc060.tar.gz | |
CVE-2014-2828 openstack-keystone: denial of service via V3 API authentication chaining
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and
icehouse before icehouse-rc2 allows remote attackers to cause a denial of
service (CPU consumption) via a large number of the same authentication
method in a request, aka "authentication chaining."
Signed-off-by: Amy Fong <amy.fong@windriver.com>
Diffstat (limited to 'meta-openstack/recipes-devtools/python/python-keystone')
| -rw-r--r-- | meta-openstack/recipes-devtools/python/python-keystone/CVE-2014-2828-keystone-1300274.patch | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/meta-openstack/recipes-devtools/python/python-keystone/CVE-2014-2828-keystone-1300274.patch b/meta-openstack/recipes-devtools/python/python-keystone/CVE-2014-2828-keystone-1300274.patch new file mode 100644 index 0000000..1c5392f --- /dev/null +++ b/meta-openstack/recipes-devtools/python/python-keystone/CVE-2014-2828-keystone-1300274.patch | |||
| @@ -0,0 +1,60 @@ | |||
| 1 | From e364ba5b12de8e4c11bd80bcca903f9615dcfc2e Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Florent Flament <florent.flament-ext@cloudwatt.com> | ||
| 3 | Date: Tue, 1 Apr 2014 12:48:22 +0000 | ||
| 4 | Subject: Sanitizes authentication methods received in requests. | ||
| 5 | |||
| 6 | When a user authenticates against Identity V3 API, he can specify | ||
| 7 | multiple authentication methods. This patch removes duplicates, which | ||
| 8 | could have been used to achieve DoS attacks. | ||
| 9 | |||
| 10 | Closes-Bug: 1300274 | ||
| 11 | (cherry picked from commit ef868ad92c00e23a4a5e9eb71e3e0bf5ae2fff0c) | ||
| 12 | Cherry-pick from https://review.openstack.org/#/c/84425/ | ||
| 13 | |||
| 14 | Change-Id: I6e60324309baa094a5e54b012fb0fc528fea72ab | ||
| 15 | |||
| 16 | diff --git a/keystone/auth/controllers.py b/keystone/auth/controllers.py | ||
| 17 | index c3399df..4944316 100644 | ||
| 18 | --- a/keystone/auth/controllers.py | ||
| 19 | +++ b/keystone/auth/controllers.py | ||
| 20 | @@ -225,7 +225,13 @@ class AuthInfo(object): | ||
| 21 | :returns: list of auth method names | ||
| 22 | |||
| 23 | """ | ||
| 24 | - return self.auth['identity']['methods'] or [] | ||
| 25 | + # Sanitizes methods received in request's body | ||
| 26 | + # Filters out duplicates, while keeping elements' order. | ||
| 27 | + method_names = [] | ||
| 28 | + for method in self.auth['identity']['methods']: | ||
| 29 | + if method not in method_names: | ||
| 30 | + method_names.append(method) | ||
| 31 | + return method_names | ||
| 32 | |||
| 33 | def get_method_data(self, method): | ||
| 34 | """Get the auth method payload. | ||
| 35 | diff --git a/keystone/tests/test_v3_auth.py b/keystone/tests/test_v3_auth.py | ||
| 36 | index d07e6ae..e89e29f 100644 | ||
| 37 | --- a/keystone/tests/test_v3_auth.py | ||
| 38 | +++ b/keystone/tests/test_v3_auth.py | ||
| 39 | @@ -81,6 +81,18 @@ class TestAuthInfo(test_v3.RestfulTestCase): | ||
| 40 | None, | ||
| 41 | auth_data) | ||
| 42 | |||
| 43 | + def test_get_method_names_duplicates(self): | ||
| 44 | + auth_data = self.build_authentication_request( | ||
| 45 | + token='test', | ||
| 46 | + user_id='test', | ||
| 47 | + password='test')['auth'] | ||
| 48 | + auth_data['identity']['methods'] = ['password', 'token', | ||
| 49 | + 'password', 'password'] | ||
| 50 | + context = None | ||
| 51 | + auth_info = auth.controllers.AuthInfo(context, auth_data) | ||
| 52 | + self.assertEqual(auth_info.get_method_names(), | ||
| 53 | + ['password', 'token']) | ||
| 54 | + | ||
| 55 | def test_get_method_data_invalid_method(self): | ||
| 56 | auth_data = self.build_authentication_request( | ||
| 57 | user_id='test', | ||
| 58 | -- | ||
| 59 | cgit v0.10.1 | ||
| 60 | |||
