CVE Vulnerabilities

CVE-2017-7214

Insertion of Sensitive Information into Log File

Published: Mar 21, 2017 | Modified: Jan 05, 2018
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.1 MODERATE
CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Ubuntu
MEDIUM

An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Nova Openstack 13.0.0 (including) 13.0.0 (including)
Nova Openstack 13.1.0 (including) 13.1.0 (including)
Nova Openstack 13.1.1 (including) 13.1.1 (including)
Nova Openstack 13.1.2 (including) 13.1.2 (including)
Nova Openstack 13.1.3 (including) 13.1.3 (including)
Nova Openstack 14.0.0 (including) 14.0.0 (including)
Nova Openstack 14.0.1 (including) 14.0.1 (including)
Nova Openstack 14.0.2 (including) 14.0.2 (including)
Nova Openstack 14.0.3 (including) 14.0.3 (including)
Nova Openstack 14.0.4 (including) 14.0.4 (including)
Nova Openstack 15.0.0 (including) 15.0.0 (including)
Nova Openstack 15.0.1 (including) 15.0.1 (including)
Red Hat OpenStack Platform 10.0 (Newton) RedHat openstack-nova-1:14.0.6-2.el7ost *
Red Hat OpenStack Platform 10.0 (Newton) RedHat python-novaclient-1:6.0.0-3.el7ost *
Red Hat OpenStack Platform 9.0 (Mitaka) RedHat openstack-nova-1:13.1.4-1.el7ost *
Nova Ubuntu precise *
Nova Ubuntu yakkety *

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References