python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
References
Configurations
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html - Patch, Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0300.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0435.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95827 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:0300 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:0435 - Third Party Advisory | |
References | () https://bugs.launchpad.net/keystonemiddleware/+bug/1628031 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://review.openstack.org/#/c/425730/ - Issue Tracking, Patch, Vendor Advisory | |
References | () https://review.openstack.org/#/c/425732/ - Issue Tracking, Patch, Vendor Advisory | |
References | () https://review.openstack.org/#/c/425734/ - Issue Tracking, Patch, Vendor Advisory | |
References | () https://usn.ubuntu.com/3666-1/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.9 |
Information
Published : 2018-05-08 17:29
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2592
Mitre link : CVE-2017-2592
CVE.ORG link : CVE-2017-2592
JSON object : View
Products Affected
canonical
- ubuntu_linux
openstack
- oslo.middleware
CWE
CWE-532
Insertion of Sensitive Information into Log File