PyPi: Zhmcclient

CVE-2024-53865

Safety vulnerability ID: 74428

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 29, 2024 Updated at Dec 08, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of zhmcclient are vulnerable to Cleartext Storage of Sensitive Information (CWE-312). Sensitive information, such as passwords, was logged in clear text, potentially allowing unauthorized individuals with access to log files to obtain credentials. This vulnerability exists in the logging of API functions where password-like properties were not properly redacted. An attacker with access to the logs could exploit this to gain sensitive information. To mitigate, upgrade to the latest version where all sensitive properties are consistently masked in logs using the BLANKED_OUT_STRING mechanism.

Affected package

zhmcclient

Latest version: 1.18.2

A pure Python client library for the IBM Z HMC Web Services API

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application