{
  "threat_severity" : "Low",
  "public_date" : "2012-02-22T00:00:00Z",
  "bugzilla" : {
    "description" : "keystone: password disclosure on command line",
    "id" : "957033",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=957033"
  },
  "cvss" : {
    "cvss_base_score" : "2.1",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
    "status" : "draft"
  },
  "details" : [ "The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process." ],
  "statement" : "The Red Hat Security Response Team has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-2013\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2013" ],
  "name" : "CVE-2013-2013",
  "csaw" : false
}