CVE-2017-2592
python-oslo-middleware: CatchErrors leaks sensitive values into error logs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
python-oslo-middleware en versiones anteriores a la 3.8.1, 3.19.1 y 3.23.1 es vulnerable a una divulgación de información. El software que emplea la clase CatchError incluye valores sensibles en un mensaje de error de traceback. Los usuarios del sistema podrían explotar este error para obtener información sensible de los registros de errores del componente openStack (por ejemplo, los tokens keystone).
An information-disclosure flaw was found in oslo.middleware. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-01 CVE Reserved
- 2017-02-23 CVE Published
- 2023-05-02 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95827 | Third Party Advisory | |
https://access.redhat.com/errata/RHSA-2017:0300 | Third Party Advisory | |
https://access.redhat.com/errata/RHSA-2017:0435 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html | 2019-10-09 | |
https://bugs.launchpad.net/keystonemiddleware/+bug/1628031 | 2019-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592 | 2019-10-09 | |
https://review.openstack.org/#/c/425730 | 2019-10-09 | |
https://review.openstack.org/#/c/425732 | 2019-10-09 | |
https://review.openstack.org/#/c/425734 | 2019-10-09 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0300.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0435.html | 2019-10-09 | |
https://usn.ubuntu.com/3666-1 | 2019-10-09 | |
https://access.redhat.com/security/cve/CVE-2017-2592 | 2017-03-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1414698 | 2017-03-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | <= 3.8.0 Search vendor "Openstack" for product "Oslo.middleware" and version " <= 3.8.0" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | >= 3.9.0 <= 3.19.0 Search vendor "Openstack" for product "Oslo.middleware" and version " >= 3.9.0 <= 3.19.0" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | >= 3.20.0 <= 3.23.0 Search vendor "Openstack" for product "Oslo.middleware" and version " >= 3.20.0 <= 3.23.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
|