CVE-2013-2013: python-keystoneclient unsecure user password update
(updated )
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the –password argument, which allows local users to obtain sensitive information by listing the process.
References
- bugs.launchpad.net/python-keystoneclient/+bug/938315
- github.com/advisories/GHSA-8q2m-pwxf-jc7g
- github.com/openstack/python-keystoneclient
- github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77
- github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2013-24.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-2013
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16937
Detect and mitigate CVE-2013-2013 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →