CVE-2022-0718: python-oslo-utils has improper password parsing
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52399%
CWE
Published
8/29/2022
Updated
10/8/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
oslo-utils | pip | < 4.10.1 | 4.10.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper regex handling in the password masking logic. The commit 6e17ae1f7959c64dfd20a5f67edf422e702426aa explicitly modifies the regex patterns and adds new wildcard patterns (_FORMAT_PATTERNS_WILDCARD) in strutils.py to address quote handling. Test cases in test_strutils.py demonstrate scenarios where passwords with quotes were previously partially exposed. The mask_password function is directly responsible for credential obfuscation in logs, making it the clear vulnerable component.