Insufficiently Protected Credentials Affecting cinder package, versions [0,14.2.0) [15.0.0, 15.3.0) [16.0.0, 16.1.0)


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Confidentiality High

    Threat Intelligence

    EPSS 0.11% (43rd percentile)
Expand this section
NVD
6.5 medium
Expand this section
Red Hat
6.5 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-CINDER-571308
  • published 4 Jun 2020
  • disclosed 3 Jun 2020
  • credit David Hill, Eric Harney

How to fix?

Upgrade cinder to version 14.2.0, 15.3.0, 16.1.0 or higher.

Overview

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Insufficiently Protected Credentials. When using Cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the connection_info element in all Block Storage v3 Attachments API calls containing that element. This enables an end user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint.

References