Safety vulnerability ID: 35420
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Python-keystoneclient 0.2.4 includes a fix for CVE-2013-2013: The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
https://bugs.launchpad.net/python-keystoneclient/+bug/938315
Latest version: 5.5.0
Client Library for OpenStack Identity
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
MLIST:[oss-security] 20130523 [Openstack] [OSSA 2013-013] Keystone client local information disclosure (CVE-2013-2013): http://www.openwall.com/lists/oss-security/2013/05/23/4
CONFIRM:https://bugs.launchpad.net/python-keystoneclient/+bug/938315: https://bugs.launchpad.net/python-keystoneclient/+bug/938315
OVAL:oval:org.mitre.oval:def:16937: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16937
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application