CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
26.5%
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback’s error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
[
{
"product": "python-oslo-middleware",
"vendor": "unspecified",
"versions": [
{
"status": "affected",
"version": "python-oslo-middleware 3.8.1"
},
{
"status": "affected",
"version": " python-oslo-middleware 3.19.1"
},
{
"status": "affected",
"version": " python-oslo-middleware 3.23.1"
}
]
}
]
lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html
rhn.redhat.com/errata/RHSA-2017-0300.html
rhn.redhat.com/errata/RHSA-2017-0435.html
www.securityfocus.com/bid/95827
access.redhat.com/errata/RHSA-2017:0300
access.redhat.com/errata/RHSA-2017:0435
bugs.launchpad.net/keystonemiddleware/+bug/1628031
bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592
review.openstack.org/#/c/425730/
review.openstack.org/#/c/425732/
review.openstack.org/#/c/425734/
usn.ubuntu.com/3666-1/
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
26.5%