Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keystone
  4. ›
  5. CVE-2013-2006

CVE-2013-2006: OpenStack Keystone Sensitive information disclosure via log files

May 17, 2022 (updated November 22, 2024)

OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.

References

  • bugs.launchpad.net/keystone/+bug/1172195
  • bugs.launchpad.net/ossn/+bug/1168252
  • github.com/advisories/GHSA-rxrm-xvp4-jqvh
  • github.com/openstack/keystone
  • github.com/openstack/keystone/commit/c5037dd6b82909efaaa8720e8cfa8bdb8b4a0edd
  • github.com/openstack/keystone/commit/d43e2a51a1ed7adbed3c5ddf001d46bc4a824ae8
  • github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-40.yaml
  • nvd.nist.gov/vuln/detail/CVE-2013-2006

Code Behaviors & Features

Detect and mitigate CVE-2013-2006 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.0.0a0

Fixed versions

  • 8.0.0a0

Solution

Upgrade to version 8.0.0a0 or above.

Impact 2.1 LOW

AV:L/AC:L/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

pypi/keystone/CVE-2013-2006.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:24 +0000.