The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
https://lists.launchpad.net/openstack/msg17034.html
https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
https://exchange.xforce.ibmcloud.com/vulnerabilities/78944
https://bugzilla.redhat.com/show_bug.cgi?id=861179
https://bugs.launchpad.net/keystone/+bug/1006822
https://bugs.launchpad.net/keystone/+bug/1006815
http://www.securityfocus.com/bid/55716