Low severityNVD Advisory· Published Mar 22, 2013· Updated Apr 29, 2026
CVE-2013-1840
CVE-2013-1840
Description
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
glancePyPI | < 11.0.0a0 | 11.0.0a0 |
Affected products
1Patches
3e75764eee349Do not return location in headers
1 file changed · +3 −0
glance/api/middleware/cache.py+3 −0 modified@@ -147,6 +147,9 @@ def _fetch_request_info(request): def _process_v1_request(self, request, image_id, image_iterator): image_meta = registry.get_image_metadata(request.context, image_id) + # Don't display location + if 'location' in image_meta: + del image_meta['location'] self._verify_metadata(image_meta) response = webob.Response(request=request)
74b067df9726Do not return location in headers
1 file changed · +3 −0
glance/api/middleware/cache.py+3 −0 modified@@ -79,6 +79,9 @@ def process_request(self, request): context = request.context try: image_meta = registry.get_image_metadata(context, image_id) + # Don't display location + if 'location' in image_meta: + del image_meta['location'] if not image_meta['size']: # override image size metadata with the actual cached
dd849a9be540Do not return location in headers
1 file changed · +3 −0
glance/api/middleware/cache.py+3 −0 modified@@ -111,6 +111,9 @@ def process_request(self, request): def _process_v1_request(self, request, image_id, image_iterator): image_meta = registry.get_image_metadata(request.context, image_id) + # Don't display location + if 'location' in image_meta: + del image_meta['location'] if not image_meta['size']: # override image size metadata with the actual cached
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
19- secunia.com/advisories/52565nvdVendor AdvisoryWEB
- github.com/advisories/GHSA-c8w9-83vg-r8vvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2013-1840ghsaADVISORY
- osvdb.org/91304nvdWEB
- rhn.redhat.com/errata/RHSA-2013-0707.htmlnvdWEB
- www.openwall.com/lists/oss-security/2013/03/14/15nvdWEB
- www.securityfocus.com/bid/58490nvdWEB
- www.ubuntu.com/usn/USN-1764-1nvdWEB
- bugs.launchpad.net/glance/+bug/1135541nvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/82878nvdWEB
- github.com/openstack/glance/commit/74b067df9726f9cf3e6e17e248719794a6ee0745ghsaWEB
- github.com/openstack/glance/commit/dd849a9be540bedd4fd904cc0b86ccd9c3e34af2ghsaWEB
- github.com/openstack/glance/commit/e75764eee34915f8bc5b664ac18e47a556c9d3ddghsaWEB
- review.openstack.orgghsaWEB
- review.openstack.orgghsaWEB
- review.openstack.orgghsaWEB
- review.openstack.orgnvd
- review.openstack.orgnvd
- review.openstack.orgnvd
News mentions
0No linked articles in our index yet.