Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <aWkInhuT5D-s-MOh@yuggoth.org>
Date: Thu, 15 Jan 2026 15:32:46 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2026-22797] OpenStack keystonemiddleware: Privilege Escalation
 via Identity Headers in External OAuth2 Tokens (CVE-2026-22797)

====================================================================
OSSA-2026-001: Privilege Escalation via Identity Headers in External
                OAuth2 Tokens
====================================================================

:Date: January 15, 2026
:CVE: CVE-2026-22797

Affects
~~~~~~~
- Keystonemiddleware: >=10.0.0 <10.7.2, >=10.8.0 <10.9.1, >=10.10.0 <10.12.1

Description
~~~~~~~~~~~
Grzegorz Grasza with Red Hat reported a vulnerability in the 
external_oauth2_token middleware for keystonemiddleware. This 
middleware fails to sanitize incoming authentication headers before 
processing OAuth 2.0 tokens. By sending forged identity headers such 
as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated 
attacker may escalate privileges or impersonate other users. All 
deployments using the external_oauth2_token middleware are affected.

Patches
~~~~~~~
- https://review.opendev.org/973499 (2024.1/caracal)
- https://review.opendev.org/973497 (2024.2/dalmatian)
- https://review.opendev.org/973496 (2025.1/epoxy)
- https://review.opendev.org/973495 (2025.2/flamingo)
- https://review.opendev.org/973494 (2026.1/gazpacho)

Credits
~~~~~~~
- Grzegorz Grasza from Red Hat (CVE-2026-22797)

References
~~~~~~~~~~
- https://launchpad.net/bugs/2129018
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22797

Notes
~~~~~
- The unmaintained/2024.1 branches will receive no new point releases,
   but patches for them are provided as a courtesy.
- This bug was possible because the middleware only conditionally set
   certain headers (e.g., X-Is-Admin-Project was only set when the token
   had admin privileges), leaving spoofed values intact when conditions
   were not met.
- The fix adds a call to remove_auth_headers() at the start of request
   processing to sanitize all incoming identity headers, matching the
   behavior of the main auth_token middleware.
- The external_oauth2_token middleware was introduced in
   keystonemiddleware 10.0.0.

-- 
Jeremy Stanley
OpenStack Vulnerability Management Team
https://security.openstack.org/vmt.html

Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.