Vulnerability Description
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Keystone | >= 2014.1, < 2014.1.5 |
| Oracle | Solaris | 11.2 |
Related Weaknesses (CWE)
References
- http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.htmlMailing ListPatchVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlThird Party Advisory
- http://www.securityfocus.com/bid/74456Third Party AdvisoryVDB Entry
- https://bugs.launchpad.net/keystone/+bug/1443598Third Party Advisory
- http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.htmlMailing ListPatchVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlThird Party Advisory
- http://www.securityfocus.com/bid/74456Third Party AdvisoryVDB Entry
- https://bugs.launchpad.net/keystone/+bug/1443598Third Party Advisory
FAQ
What is CVE-2015-3646?
CVE-2015-3646 is a vulnerability with a CVSS score of 4.0 (MEDIUM). OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other...
How severe is CVE-2015-3646?
CVE-2015-3646 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3646?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Keystone, Oracle Solaris.