54 lines
1.1 KiB
YAML
54 lines
1.1 KiB
YAML
date: 2013-05-23
|
|
|
|
id: OSSA-2013-013
|
|
|
|
title: 'Keystone client local information disclosure'
|
|
|
|
description: 'Jake Dahn from Nebula reported a vulnerability that the keystone client
|
|
only allows passwords to be updated in a clear text command-line argument, which
|
|
may enable other local users to obtain sensitive information by listing the process
|
|
and potentially leaves a record of the password within the shell command history.'
|
|
|
|
reference: https://lists.launchpad.net/openstack/msg23923.html
|
|
|
|
affected-products:
|
|
|
|
- product: python-keystoneclient
|
|
version: All versions
|
|
|
|
vulnerabilities:
|
|
|
|
- cve-id: CVE-2013-2013
|
|
impact-assessment:
|
|
source: 'Red Hat Product Security'
|
|
rating: low
|
|
assessment:
|
|
type: CVSS2
|
|
score: 2.1
|
|
detail: AV:L/AC:L/Au:N/C:P/I:N/A:N
|
|
classification:
|
|
source: 'Red Hat Product Security'
|
|
type: CWE
|
|
detail: TODO
|
|
|
|
reporters:
|
|
|
|
- name: 'Jake Dahn'
|
|
affiliation: Nebula
|
|
reported:
|
|
- CVE-2013-2013
|
|
|
|
issues:
|
|
|
|
links:
|
|
- https://launchpad.net/bugs/938315
|
|
|
|
type: launchpad
|
|
|
|
reviews:
|
|
|
|
links:
|
|
- https://review.openstack.org/#/c/28702
|
|
|
|
type: gerrit
|