Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qd3B3LXBwajUtN2g0d84AAQdw
OpenStack Keystone Logs Passwords
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
Permalink: https://github.com/advisories/GHSA-jwpw-ppj5-7h4wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qd3B3LXBwajUtN2g0d84AAQdw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago
Identifiers: GHSA-jwpw-ppj5-7h4w, CVE-2015-3646
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-3646
- https://bugs.launchpad.net/keystone/+bug/1443598
- http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- https://web.archive.org/web/20210122154200/http://www.securityfocus.com/bid/74456
- https://github.com/advisories/GHSA-jwpw-ppj5-7h4w
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 17,946 last month
Affected Version Ranges: >= 2011.3, < 2014.1.5, >= 2014.2, < 2014.2.4
Fixed in: 2014.1.5, 2014.2.4
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0