CVE-2015-3646

Related Vulnerabilities: CVE-2015-3646  

OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.

The MITRE CVE dictionary describes this issue as:

OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.

Find out more about CVE-2015-3646 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

While this issue does occur in openstack-keystone packages as shipped in Red Hat Enterprise Linux OpenStack Platform versions 5 and 6 it is not believed to be exploitable as access to the keystone logs is restricted with file-system permissions.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 3.5
Base Metrics AV:N/AC:M/Au:S/C:P/I:N/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 openstack-keystone Not affected
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) openstack-keystone Not affected
Red Hat Enterprise Linux OpenStack Platform 4.0 openstack-keystone Will not fix