First published: Tue Oct 01 2013(Updated: )
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-keystoneclient | <0.2.4 | 0.2.4 |
OpenStack Keystone | <=0.2.3 | |
OpenStack Keystone | =0.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2013 is considered a medium severity vulnerability due to its potential for exposing sensitive information.
To fix CVE-2013-2013, upgrade python-keystoneclient to version 0.2.4 or later.
Users of python-keystoneclient versions before 0.2.4 are affected by CVE-2013-2013.
CVE-2013-2013 is caused by the user-password-update command accepting passwords through a parameter that can be viewed in process listings.
CVE-2013-2013 is a local vulnerability, as it requires local user access to exploit.