Safety vulnerability ID: 74428
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of zhmcclient are vulnerable to Cleartext Storage of Sensitive Information (CWE-312). Sensitive information, such as passwords, was logged in clear text, potentially allowing unauthorized individuals with access to log files to obtain credentials. This vulnerability exists in the logging of API functions where password-like properties were not properly redacted. An attacker with access to the logs could exploit this to gain sensitive information. To mitigate, upgrade to the latest version where all sensitive properties are consistently masked in logs using the BLANKED_OUT_STRING mechanism.
Latest version: 1.18.2
A pure Python client library for the IBM Z HMC Web Services API
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application