Jake Dahn reports: Updating password via CLI should be done via a secure password prompt, not text. current: keystone user-password-update --user=jake --password=foo expected: keystone user-password-update --user=jake Password: Repeat Password: OpenStack keystone places a username and password on the command line, which allows local users to obtain credentials by listing the process.
Created openstack-keystone tracking bugs for this issue Affects: fedora-all [bug 957034]
Created openstack-keystone tracking bugs for this issue Affects: epel-6 [bug 957035]
Upstream RFE https://blueprints.launchpad.net/python-keystoneclient/+spec/prompt-for-password
Jeremy Stanley (jeremy) reports: Title: Keystone client local information disclosure Reporter: Jake Dahn (Nebula) Products: python-keystoneclient Affects: All versions Description: Jake Dahn from Nebula reported a vulnerability that the keystone client only allows passwords to be updated in a clear text command-line argument, which may enable other local users to obtain sensitive information by listing the process and potentially leaves a record of the password within the shell command history. Fix: https://review.openstack.org/28702 External references: https://bugs.launchpad.net/python-keystoneclient/+bug/938315
Created python-keystoneclient tracking bugs for this issue Affects: fedora-rawhide [bug 971837]
Fixed in python-keystoneclient 0.2.4 http://github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77
python-keystoneclient-0.2.0-3.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
python-keystoneclient-0.2.0-2.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
Statement: The Red Hat Security Response Team has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.