Low severityNVD Advisory· Published May 21, 2013· Updated Apr 29, 2026
CVE-2013-2006
CVE-2013-2006
Description
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
keystonePyPI | < 8.0.0a0 | 8.0.0a0 |
Affected products
1Patches
2d43e2a51a1edMark LDAP password and admin_token secret
1 file changed · +2 −2
keystone/common/config.py+2 −2 modified@@ -188,7 +188,7 @@ def configure(): register_cli_str('pydev-debug-host', default=None) register_cli_int('pydev-debug-port', default=None) - register_str('admin_token', default='ADMIN') + register_str('admin_token', secret=True, default='ADMIN') register_str('bind_host', default='0.0.0.0') register_int('compute_port', default=8774) register_int('admin_port', default=35357) @@ -286,7 +286,7 @@ def configure(): # ldap register_str('url', group='ldap', default='ldap://localhost') register_str('user', group='ldap', default=None) - register_str('password', group='ldap', default=None) + register_str('password', group='ldap', secret=True, default=None) register_str('suffix', group='ldap', default='cn=example,cn=com') register_bool('use_dumb_member', group='ldap', default=False) register_str('dumb_member', group='ldap', default='cn=dumb,dc=nonexistent')
c5037dd6b829Mark LDAP password and admin_token secret
1 file changed · +2 −2
keystone/common/config.py+2 −2 modified@@ -188,7 +188,7 @@ def configure(): register_cli_str('pydev-debug-host', default=None) register_cli_int('pydev-debug-port', default=None) - register_str('admin_token', default='ADMIN') + register_str('admin_token', secret=True, default='ADMIN') register_str('bind_host', default='0.0.0.0') register_int('compute_port', default=8774) register_int('admin_port', default=35357) @@ -271,7 +271,7 @@ def configure(): # ldap register_str('url', group='ldap', default='ldap://localhost') register_str('user', group='ldap', default=None) - register_str('password', group='ldap', default=None) + register_str('password', group='ldap', secret=True, default=None) register_str('suffix', group='ldap', default='cn=example,cn=com') register_bool('use_dumb_member', group='ldap', default=False) register_str('dumb_member', group='ldap', default='cn=dumb,dc=nonexistent')
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
13- rhn.redhat.com/errata/RHSA-2013-0806.htmlnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-rxrm-xvp4-jqvhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2013-2006ghsaADVISORY
- lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.htmlnvdWEB
- lists.fedoraproject.org/pipermail/package-announce/2013-May/106220.htmlnvdWEB
- www.openwall.com/lists/oss-security/2013/04/24/1nvdWEB
- www.openwall.com/lists/oss-security/2013/04/24/2nvdWEB
- www.securityfocus.com/bid/59411nvdWEB
- bugs.launchpad.net/keystone/+bug/1172195nvdWEB
- bugs.launchpad.net/ossn/+bug/1168252nvdWEB
- github.com/openstack/keystone/commit/c5037dd6b82909efaaa8720e8cfa8bdb8b4a0eddnvdWEB
- github.com/openstack/keystone/commit/d43e2a51a1ed7adbed3c5ddf001d46bc4a824ae8ghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-40.yamlghsaWEB
News mentions
0No linked articles in our index yet.