Vulnerability Description
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Python-Keystoneclient | <= 0.2.3 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2013/05/23/4Patch
- https://bugs.launchpad.net/python-keystoneclient/+bug/938315
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://www.openwall.com/lists/oss-security/2013/05/23/4Patch
- https://bugs.launchpad.net/python-keystoneclient/+bug/938315
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2013-2013?
CVE-2013-2013 is a vulnerability with a CVSS score of 2.1 (LOW). The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the proc...
How severe is CVE-2013-2013?
CVE-2013-2013 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2013?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Python-Keystoneclient.