Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yeHJtLXh2cDQtanF2aM4AAeks
OpenStack Keystone Sensitive information disclosure via log files
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.
Permalink: https://github.com/advisories/GHSA-rxrm-xvp4-jqvhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yeHJtLXh2cDQtanF2aM4AAeks
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
EPSS Percentage: 0.00042
EPSS Percentile: 0.05089
Identifiers: GHSA-rxrm-xvp4-jqvh, CVE-2013-2006
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-2006
- https://github.com/openstack/keystone/commit/c5037dd6b82909efaaa8720e8cfa8bdb8b4a0edd
- https://bugs.launchpad.net/keystone/+bug/1172195
- https://bugs.launchpad.net/ossn/+bug/1168252
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106220.html
- http://rhn.redhat.com/errata/RHSA-2013-0806.html
- http://www.openwall.com/lists/oss-security/2013/04/24/1
- http://www.openwall.com/lists/oss-security/2013/04/24/2
- http://www.securityfocus.com/bid/59411
- https://github.com/openstack/keystone/commit/d43e2a51a1ed7adbed3c5ddf001d46bc4a824ae8
- https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-40.yaml
- https://github.com/advisories/GHSA-rxrm-xvp4-jqvh
Blast Radius: 0.0
Affected Packages
pypi:keystone
Dependent packages: 3Dependent repositories: 37
Downloads: 16,495 last month
Affected Version Ranges: < 8.0.0a0
Fixed in: 8.0.0a0
All affected versions:
All unaffected versions: 12.0.2, 12.0.3, 13.0.2, 13.0.3, 13.0.4, 14.0.0, 14.0.1, 14.1.0, 14.2.0, 15.0.0, 15.0.1, 16.0.0, 16.0.1, 16.0.2, 17.0.0, 17.0.1, 18.0.0, 18.1.0, 19.0.0, 19.0.1, 20.0.0, 20.0.1, 21.0.0, 21.0.1, 22.0.0, 22.0.1, 22.0.2, 23.0.0, 23.0.1, 23.0.2, 24.0.0, 25.0.0, 26.0.0