CVE-2015-3646

OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.html - Mailing List, Patch, Vendor Advisory () http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.html - Mailing List, Patch, Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - Third Party Advisory
References () http://www.securityfocus.com/bid/74456 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74456 - Third Party Advisory, VDB Entry
References () https://bugs.launchpad.net/keystone/+bug/1443598 - Third Party Advisory () https://bugs.launchpad.net/keystone/+bug/1443598 - Third Party Advisory

Information

Published : 2015-05-12 19:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3646

Mitre link : CVE-2015-3646

CVE.ORG link : CVE-2015-3646


JSON object : View

Products Affected

openstack

  • keystone

oracle

  • solaris
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor