First published: Tue Jan 22 2013(Updated: )
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated users to obtain sensitive information by reading the error messages.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/glance | >=2012.1<2012.2.3 | 2012.2.3 |
OpenStack Glance | =2012.1 | |
OpenStack Glance | =2012.2 | |
OpenStack Glance | =2012.2.1 | |
OpenStack Glance | =2012.2.2 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0212 is classified as a moderate severity vulnerability due to the exposure of sensitive user credentials.
To remediate CVE-2013-0212, upgrade to OpenStack Glance version 2012.2.3 or later.
CVE-2013-0212 affects OpenStack Glance versions 2012.1, 2012.2, 2012.2.1, and 2012.2.2.
CVE-2013-0212 exposes the Swift endpoint's user name and password in cleartext.
CVE-2013-0212 occurs when OpenStack Glance is configured to run in Swift single tenant mode.