First published: Tue May 21 2013(Updated: )
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | =2013.1.1 | |
pip/keystone | <8.0.0a0 | 8.0.0a0 |
=2013.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2006 is considered a moderate severity vulnerability due to its potential exposure of sensitive information in log files.
To remediate CVE-2013-2006, disable DEBUG logging in OpenStack Keystone or upgrade to a fixed version of the software that removes this logging behavior.
CVE-2013-2006 specifically affects OpenStack Identity Keystone version 2013.1.1.
CVE-2013-2006 can expose the admin_token and LDAP password in plaintext through debug logs.
Yes, local users with access to the log files can exploit CVE-2013-2006 to obtain sensitive credentials.