CVE-2017-2592
python-oslo-middleware: CatchErrors leaks sensitive values into error logs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
python-oslo-middleware en versiones anteriores a la 3.8.1, 3.19.1 y 3.23.1 es vulnerable a una divulgación de información. El software que emplea la clase CatchError incluye valores sensibles en un mensaje de error de traceback. Los usuarios del sistema podrían explotar este error para obtener información sensible de los registros de errores del componente openStack (por ejemplo, los tokens keystone).
An information-disclosure flaw was found in oslo.middleware. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
The OpenStack Oslo Middleware library provides components that can be injected into WSGI pipelines to intercept request and response flows. The base class can be enhanced with functionality like adding or updating HTTP headers, or to offer support for limiting size or connections. Security Fix: An information-disclosure flaw was found in oslo.middleware. Software using the CatchError class could include sensitive values in a traceback's error message. Remote users could exploit this flaw to obtain sensitive information from OpenStack component error logs.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-01 CVE Reserved
- 2017-02-23 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95827 | Third Party Advisory | |
https://access.redhat.com/errata/RHSA-2017:0300 | Third Party Advisory | |
https://access.redhat.com/errata/RHSA-2017:0435 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html | 2019-10-09 | |
https://bugs.launchpad.net/keystonemiddleware/+bug/1628031 | 2019-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592 | 2019-10-09 | |
https://review.openstack.org/#/c/425730 | 2019-10-09 | |
https://review.openstack.org/#/c/425732 | 2019-10-09 | |
https://review.openstack.org/#/c/425734 | 2019-10-09 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0300.html | 2019-10-09 | |
http://rhn.redhat.com/errata/RHSA-2017-0435.html | 2019-10-09 | |
https://usn.ubuntu.com/3666-1 | 2019-10-09 | |
https://access.redhat.com/security/cve/CVE-2017-2592 | 2017-03-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1414698 | 2017-03-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | <= 3.8.0 Search vendor "Openstack" for product "Oslo.middleware" and version " <= 3.8.0" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | >= 3.9.0 <= 3.19.0 Search vendor "Openstack" for product "Oslo.middleware" and version " >= 3.9.0 <= 3.19.0" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Oslo.middleware Search vendor "Openstack" for product "Oslo.middleware" | >= 3.20.0 <= 3.23.0 Search vendor "Openstack" for product "Oslo.middleware" and version " >= 3.20.0 <= 3.23.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
|