The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and delete arbitrary resources, contrary to expectations.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: suse
Published:
Updated: 2024-09-17T02:53:23.354Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3683

No data.

Status : Modified
Published: 2020-01-17T11:15:11.813
Modified: 2024-11-21T04:42:19.500
Link: CVE-2019-3683

No data.