CVE-2024-53865 – zhmcclient
Package
Manager: pip
Name: zhmcclient
Vulnerable Version: >=0 <1.18.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
EPSS: 0.00023 pctl0.04504
Details
Python package "zhmcclient" stores passwords in clear text in its HMC and API logs ### Impact The Python package "zhmcclient" writes password-like properties in clear text into its HMC and API logs in the following cases: * The 'boot-ftp-password' and 'ssc-master-pw' properties when creating or updating a partition in DPM mode, in the zhmcclient API and HMC logs * The 'ssc-master-pw' and 'zaware-master-pw' properties when updating an LPAR in classic mode, in the zhmcclient API and HMC logs * The 'ssc-master-pw' and 'zaware-master-pw' properties when creating or updating an image activation profile in classic mode, in the zhmcclient API and HMC logs * The 'password' property when creating or updating an HMC user, in the zhmcclient API log * The 'bind-password' property when creating or updating an LDAP server definition, in the zhmcclient API and HMC logs This issue affects only users of the zhmcclient package that have enabled the Python loggers named "zhmcclient.api" (for the API log) or "zhmcclient.hmc" (for the HMC log) and that use the functions listed above. ### Patches Has been fixed in zhmcclient version 1.18.1 ### Workarounds Not applicable, since fix is available. ### References None
Metadata
Created: 2024-12-02T18:35:18Z
Modified: 2024-12-02T18:35:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-p57h-3cmc-xpjq/GHSA-p57h-3cmc-xpjq.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-p57h-3cmc-xpjq
Finding: F020
Auto approve: 1