#VU73891 Insufficiently protected credentials in oslo.utils - CVE-2022-0718
Published: March 21, 2023
Vulnerability identifier: #VU73891
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-0718
CWE-ID: CWE-522
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
oslo.utils
oslo.utils
Software vendor:
Openstack
Openstack
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper input validation when handling a double quote character in the password, causing any part of the password after the double quote to be plaintext. A local user can view the log files and obtain password in clear text.
Remediation
Install updates from vendor's website.
External links
- https://security-tracker.debian.org/tracker/CVE-2022-0718
- https://bugzilla.redhat.com/show_bug.cgi?id=2056850
- https://access.redhat.com/security/cve/CVE-2022-0718
- https://bugs.launchpad.net/oslo.utils/+bug/1949623
- https://opendev.org/openstack/oslo.utils/commit/6e17ae1f7959c64dfd20a5f67edf422e702426aa
- https://lists.debian.org/debian-lts-announce/2022/09/msg00015.html