Insufficiently Protected Credentials Affecting cinder package, versions [0,14.2.0) [15.0.0, 15.3.0) [16.0.0, 16.1.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-CINDER-571308
  • published 4 Jun 2020
  • disclosed 3 Jun 2020
  • credit David Hill, Eric Harney

How to fix?

Upgrade cinder to version 14.2.0, 15.3.0, 16.1.0 or higher.

Overview

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Insufficiently Protected Credentials. When using Cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the connection_info element in all Block Storage v3 Attachments API calls containing that element. This enables an end user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.5 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

6.5 medium
Expand this section

Red Hat

6.5 medium