{"package":"keystone","ecosystem":"pypi","latest_version":"29.0.1","description":"OpenStack Identity","license":"Apache-2.0","license_risk":"permissive","commercial_use_notes":"Permissive: commercial closed-source use OK; preserve the copyright notice.","homepage":"https://pypi.org/project/keystone/","repository":"","downloads_weekly":14397,"health":{"score":68,"risk":"moderate","breakdown":{"maintenance":25,"popularity":10,"security":18,"maturity":15,"community":0},"deprecated":false,"max_score":100},"vulnerabilities":{"count":4,"critical":0,"high":1,"medium":1,"low":2,"details":[{"vuln_id":"CVE-2012-3542","severity":"high","summary":"OpenStack Keystone Allows Remote User Account Creation","affected_versions":"<2012.1|=12.0.2|=12.0.3|=13.0.2|=13.0.3|=13.0.4|=14.0.0|=14.0.1|=14.1.0|=14.2.0|=15.0.0|=15.0.0.0rc1|=15.0.0.0rc2|=15.0.1|=16.0.0|=16.0.0.0rc1|=16.0.0.0rc2|=16.0.1|=16.0.2|=17.0.0|=17.0.0.0rc1|=17.0.0.0rc2|=17.0.1|=18.0.0|=18.0.0.0rc1|=18.1.0|=19.0.0|=19.0.0.0rc1|=19.0.0.0rc2|=19.0.1|=20.0.0|=20.0.0.0rc1|=20.0.1|=21.0.0|=21.0.0.0rc1|=21.0.1|=22.0.0|=22.0.0.0rc1|=22.0.1|=22.0.2|=23.0.0|=23.0.0.0rc1|=23.0.1|=23.0.2|=24.0.0|=24.0.0.0rc1|=25.0.0|=25.0.0.0rc1|=26.0.0.0rc1","fixed_version":"2012.1","source":"osv","published_at":"2022-05-17T05:22:32Z","in_kev":false,"epss_prob":0.01949,"epss_percentile":0.83536,"threat_tier":"theoretical"},{"vuln_id":"CVE-2012-4413","severity":"medium","summary":"OpenStack Keystone does not invalidate existing tokens when granting or revoking roles","affected_versions":"<2012.1.3|=12.0.2|=12.0.3|=13.0.2|=13.0.3|=13.0.4|=14.0.0|=14.0.1|=14.1.0|=14.2.0|=15.0.0|=15.0.0.0rc1|=15.0.0.0rc2|=15.0.1|=16.0.0|=16.0.0.0rc1|=16.0.0.0rc2|=16.0.1|=16.0.2|=17.0.0|=17.0.0.0rc1|=17.0.0.0rc2|=17.0.1|=18.0.0|=18.0.0.0rc1|=18.1.0|=19.0.0|=19.0.0.0rc1|=19.0.0.0rc2|=19.0.1|=20.0.0|=20.0.0.0rc1|=20.0.1|=21.0.0|=21.0.0.0rc1|=21.0.1|=22.0.0|=22.0.0.0rc1|=22.0.1|=22.0.2|=23.0.0|=23.0.0.0rc1|=23.0.1|=23.0.2|=24.0.0|=24.0.0.0rc1|=25.0.0|=25.0.0.0rc1|=26.0.0|=26.0.0.0rc1","fixed_version":"2012.1.3","source":"osv","published_at":"2022-05-17T01:42:10Z","in_kev":false,"epss_prob":0.00428,"epss_percentile":0.62511,"threat_tier":"theoretical"},{"vuln_id":"CVE-2012-3542","severity":"unknown","summary":"OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API.  NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.","affected_versions":"<c13d0ba606f7b2bdc609a7f388334e5efec3f3aa|=12.0.2|=12.0.3|=13.0.2|=13.0.3|=13.0.4|=14.0.0|=14.0.1|=14.1.0|=14.2.0|=15.0.0|=15.0.0.0rc1|=15.0.0.0rc2|=15.0.1|=16.0.0|=16.0.0.0rc1|=16.0.0.0rc2|=16.0.1|=16.0.2|=17.0.0|=17.0.0.0rc1|=17.0.0.0rc2|=17.0.1|=18.0.0|=18.0.0.0rc1|=18.1.0|=19.0.0|=19.0.0.0rc1|=19.0.0.0rc2|=19.0.1|=20.0.0|=20.0.0.0rc1|=20.0.1|=21.0.0|=21.0.0.0rc1|=21.0.1|=22.0.0|=22.0.0.0rc1|=22.0.1|=23.0.0|=23.0.0.0rc1|=23.0.1|=24.0.0|=24.0.0.0rc1|=22.0.2|=23.0.2|=24.1.0|=25.0.0|=25.0.0.0rc1|=26.0.0|=26.0.0.0rc1|=27.0.0|=27.0.0.0rc1|=28.0.0|=28.0.0.0rc1","fixed_version":"c13d0ba606f7b2bdc609a7f388334e5efec3f3aa","source":"osv","published_at":"2012-09-05T23:55:00Z","in_kev":false,"epss_prob":0.01949,"epss_percentile":0.83536,"threat_tier":"theoretical"},{"vuln_id":"CVE-2012-5563","severity":"unknown","summary":"OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining.  NOTE: this issue exists because of a CVE-2012-3426 regression.","affected_versions":"<f9d4766249a72d8f88d75dcf1575b28dd3496681|=12.0.2|=12.0.3|=13.0.2|=13.0.3|=13.0.4|=14.0.0|=14.0.1|=14.1.0|=14.2.0|=15.0.0|=15.0.0.0rc1|=15.0.0.0rc2|=15.0.1|=16.0.0|=16.0.0.0rc1|=16.0.0.0rc2|=16.0.1|=16.0.2|=17.0.0|=17.0.0.0rc1|=17.0.0.0rc2|=17.0.1|=18.0.0|=18.0.0.0rc1|=18.1.0|=19.0.0|=19.0.0.0rc1|=19.0.0.0rc2|=19.0.1|=20.0.0|=20.0.0.0rc1|=20.0.1|=21.0.0|=21.0.0.0rc1|=21.0.1|=22.0.0|=22.0.0.0rc1|=22.0.1|=23.0.0|=23.0.0.0rc1|=23.0.1|=24.0.0|=24.0.0.0rc1|=22.0.2|=23.0.2|=24.1.0|=25.0.0|=25.0.0.0rc1|=26.0.0|=26.0.0.0rc1|=27.0.0|=27.0.0.0rc1|=28.0.0|=28.0.0.0rc1","fixed_version":"f9d4766249a72d8f88d75dcf1575b28dd3496681","source":"osv","published_at":"2012-12-18T01:55:00Z","in_kev":false,"epss_prob":0.00392,"epss_percentile":0.60196,"threat_tier":"theoretical"}],"actively_exploited_count":0,"likely_exploited_count":0},"versions":{"latest":"29.0.1","total_count":61,"recent":["23.0.1","23.0.2","24.0.0.0rc1","24.0.0","24.1.0","25.0.0.0rc1","25.0.0","26.0.0.0rc1","26.0.0","26.1.0","26.1.1","27.0.0.0rc1","27.0.0","27.0.1","28.0.0.0rc1","28.0.0","28.0.1","29.0.0.0rc1","29.0.0","29.0.1"]},"metadata":{"deprecated":false,"deprecated_message":null,"maintainers_count":0,"first_published":null,"last_published":"2026-04-16T09:33:42.571591Z","dependencies_count":33,"dependencies":["pbr!=2.1.0,>=2.0.0","WebOb>=1.7.1","Flask!=0.11,>=1.0.2","Flask-RESTful>=0.3.5","cryptography>=2.7","SQLAlchemy>=1.4.0","stevedore>=1.20.0","python-keystoneclient>=3.8.0","keystonemiddleware>=7.0.0","bcrypt>=3.1.3","oslo.cache>=1.26.0","oslo.config>=6.8.0","oslo.context>=2.22.0","oslo.messaging>=5.29.0","oslo.db>=6.0.0","oslo.i18n>=3.15.3","oslo.log>=3.44.0","oslo.middleware>=3.31.0","oslo.policy>=4.5.0","oslo.serialization!=2.19.1,>=2.18.0","oslo.upgradecheck>=1.3.0","oslo.utils>=3.33.0","oauthlib>=0.6.2","pysaml2>=5.0.0","PyJWT>=1.6.1","dogpile.cache>=1.0.2","jsonschema>=3.2.0","pycadf!=2.0.0,>=1.1.0","msgpack>=0.5.0","osprofiler>=1.4.0","Werkzeug>=0.15.0","python-ldap>=3.0.0; extra == \"ldap\"","ldappool>=2.3.1; extra == \"ldap\""]},"github_stats":null,"bundle":null,"typescript":null,"known_issues":{"bugs_count":0,"bugs_severity":{},"status_breakdown":{},"link":null,"scope":"none"},"historical_compromise":null,"recommendation":{"action":"update_required","issues":["Moderate health score (68/100) — verify manually","1 high severity vulnerabilities"],"use_version":"29.0.1","version_hint":"Update to >= f9d4766249a72d8f88d75dcf1575b28dd3496681 to fix known vulnerabilities","summary":"keystone@29.0.1 has vulnerabilities — update to latest"},"version_scoped":null,"_meta":{"endpoint":"check","tier":"full","philosophy":"DepScope is free. Use the cheapest endpoint that answers your real question.","cheaper_alternatives":[{"endpoint":"/api/exists/pypi/keystone","tokens_estimated":12,"use_when":"you only need to know if the package exists (hallucination guard)"},{"endpoint":"/api/health/pypi/keystone","tokens_estimated":80,"use_when":"you only need a 0-100 score for go/no-go (>=70 = safe)"},{"endpoint":"/api/prompt/pypi/keystone","tokens_estimated":280,"use_when":"you want a plain-text LLM-friendly brief instead of JSON"},{"endpoint":"POST /api/check_bulk","tokens_estimated":60,"use_when":"you have 5+ packages to check; sends one round-trip instead of N"}],"docs":"https://depscope.dev/integrate"},"requested_version":null,"_cache":"miss","_response_ms":2234,"_powered_by":"depscope.dev — free package intelligence for AI agents","typosquat":{"is_suspected":false},"maintainer_trust":{"available":false},"malicious":{"is_malicious":false},"scorecard":{"available":false},"quality":{"available":false},"version_history_summary":{"total_versions":20,"first_release_age_days":null,"last_release_days_ago":16,"avg_days_between_releases":null,"release_velocity":"active"}}