VYPR
Low severityNVD Advisory· Published May 21, 2013· Updated Apr 29, 2026

CVE-2013-2006

CVE-2013-2006

Description

OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
keystonePyPI
< 8.0.0a08.0.0a0

Affected products

1

Patches

2
d43e2a51a1ed

Mark LDAP password and admin_token secret

https://github.com/openstack/keystoneXuhan PengApr 12, 2013via ghsa
1 file changed · +2 2
  • keystone/common/config.py+2 2 modified
    @@ -188,7 +188,7 @@ def configure():
         register_cli_str('pydev-debug-host', default=None)
         register_cli_int('pydev-debug-port', default=None)
     
    -    register_str('admin_token', default='ADMIN')
    +    register_str('admin_token', secret=True, default='ADMIN')
         register_str('bind_host', default='0.0.0.0')
         register_int('compute_port', default=8774)
         register_int('admin_port', default=35357)
    @@ -286,7 +286,7 @@ def configure():
         # ldap
         register_str('url', group='ldap', default='ldap://localhost')
         register_str('user', group='ldap', default=None)
    -    register_str('password', group='ldap', default=None)
    +    register_str('password', group='ldap', secret=True, default=None)
         register_str('suffix', group='ldap', default='cn=example,cn=com')
         register_bool('use_dumb_member', group='ldap', default=False)
         register_str('dumb_member', group='ldap', default='cn=dumb,dc=nonexistent')
    
c5037dd6b829

Mark LDAP password and admin_token secret

https://github.com/openstack/keystoneXuhan PengApr 12, 2013via ghsa
1 file changed · +2 2
  • keystone/common/config.py+2 2 modified
    @@ -188,7 +188,7 @@ def configure():
         register_cli_str('pydev-debug-host', default=None)
         register_cli_int('pydev-debug-port', default=None)
     
    -    register_str('admin_token', default='ADMIN')
    +    register_str('admin_token', secret=True, default='ADMIN')
         register_str('bind_host', default='0.0.0.0')
         register_int('compute_port', default=8774)
         register_int('admin_port', default=35357)
    @@ -271,7 +271,7 @@ def configure():
         # ldap
         register_str('url', group='ldap', default='ldap://localhost')
         register_str('user', group='ldap', default=None)
    -    register_str('password', group='ldap', default=None)
    +    register_str('password', group='ldap', secret=True, default=None)
         register_str('suffix', group='ldap', default='cn=example,cn=com')
         register_bool('use_dumb_member', group='ldap', default=False)
         register_str('dumb_member', group='ldap', default='cn=dumb,dc=nonexistent')
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

13

News mentions

0

No linked articles in our index yet.