{"id":"CVE-2017-2592","details":"python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).","aliases":["GHSA-xcp8-hh74-f6mc","PYSEC-2018-104"],"modified":"2026-04-02T00:10:16.214238Z","published":"2018-05-08T17:29:00.560Z","related":["SUSE-SU-2017:0848-1","SUSE-SU-2017:1062-1","SUSE-SU-2018:3924-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3666-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95827"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0435"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0300.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0435.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0300"},{"type":"FIX","url":"https://bugs.launchpad.net/keystonemiddleware/+bug/1628031"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592"},{"type":"FIX","url":"https://review.openstack.org/#/c/425732/"},{"type":"FIX","url":"https://review.openstack.org/#/c/425734/"},{"type":"FIX","url":"http://lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html"},{"type":"FIX","url":"https://review.openstack.org/#/c/425730/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openstack/oslo.middleware","events":[{"introduced":"0"},{"last_affected":"8ecaab7d2df6f05dbcd4b48b3c4d12a462161681"},{"introduced":"d5974a05f7aa9b8d5406003f1fb9ac6290fe6f0e"},{"last_affected":"ddbb2e42c0d66e01c7851f4a00df11b5a693d77c"},{"introduced":"cc9810787ea953ed0625284cd73423574e487b97"},{"last_affected":"5307c7e43f32ff4d3c1b3a742718f6085296fdf6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.8.0"},{"introduced":"3.9.0"},{"last_affected":"3.19.0"},{"introduced":"3.20.0"},{"last_affected":"3.23.0"}]}}],"versions":["0.1.0","0.2.0","0.3.0","0.4.0","0.5.0","1.0.0","1.1.0","1.2.0","1.3.0","2.0.0","2.1.0","2.10.0","2.11.0","2.2.0","2.3.0","2.4.0","2.5.0","2.6.0","2.6.1","2.7.0","2.8.0","2.9.0","3.0.0","3.1.0","3.10.0","3.11.0","3.12.0","3.13.0","3.14.0","3.15.0","3.16.0","3.17.0","3.18.0","3.19.0","3.2.0","3.20.0","3.21.0","3.22.0","3.23.0","3.3.0","3.4.0","3.5.0","3.6.0","3.7.0","3.8.0","3.9.0","juno-eol","kilo-eol","liberty-eol"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-2592.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}