CVE-2013-2166: Inadequate Encryption Strength in python-keystoneclient
(updated )
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass.
References
- access.redhat.com/security/cve/cve-2013-2166
- bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166
- bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166
- github.com/advisories/GHSA-c3xq-cj8f-7829
- github.com/openstack/python-keystoneclient
- github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e
- github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2019-197.yaml
- nvd.nist.gov/vuln/detail/CVE-2013-2166
- security-tracker.debian.org/tracker/CVE-2013-2166
Detect and mitigate CVE-2013-2166 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →