First published: Tue May 12 2015(Updated: )
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keystone | >=2011.3<2014.1.5 | 2014.1.5 |
pip/keystone | >=2014.2<2014.2.4 | 2014.2.4 |
OpenStack keystonemiddleware | >=2014.1<2014.1.5 | |
OpenStack keystonemiddleware | >=2014.2.0<2014.2.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3646 has a high severity level due to the potential exposure of sensitive backend information to authenticated users.
To fix CVE-2015-3646, upgrade to Keystone version 2014.1.5 or 2014.2.4 or later.
CVE-2015-3646 is a logging vulnerability that exposes sensitive data through log files.
CVE-2015-3646 affects users of OpenStack Identity (Keystone) before version 2014.1.5 and 2014.2.x before 2014.2.4.
CVE-2015-3646 can expose sensitive information such as passwords and backend configuration details.