Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1141: Logging of Excessive Data

0
Medium
VulnerabilityCVE-2024-1141cvecve-2024-1141
Published: Thu Feb 01 2024 (02/01/2024, 14:21:37 UTC)
Source: CVE Database V5

Description

A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:10:11 UTC

Technical Analysis

CVE-2024-1141 is a vulnerability identified in the python-glance-store package, a component commonly used in OpenStack environments for managing image storage. The flaw arises when the package logs the access_key credential at the DEBUG log level, inadvertently exposing sensitive authentication information in log files. This logging of excessive data can lead to confidentiality breaches if logs are accessed by unauthorized users. The vulnerability requires local privileges to exploit, meaning an attacker must have some level of access to the system to trigger the logging of the access_key. No user interaction is needed, and the attack vector is local (AV:L). The vulnerability does not affect integrity or availability but poses a high confidentiality risk. The CVSS 3.1 base score is 5.5, indicating medium severity. There are no known exploits in the wild, and no patches or mitigations have been explicitly linked yet, but the issue is publicly disclosed and should be addressed promptly. The vulnerability highlights the risk of sensitive data leakage through debug-level logging, a common security oversight in software development and deployment.

Potential Impact

The primary impact of CVE-2024-1141 is the potential exposure of sensitive access_key credentials through debug logs. If an attacker gains access to these logs, they could use the credentials to access or manipulate image storage resources within OpenStack environments, leading to unauthorized data access or cloud resource misuse. Although exploitation requires local access, insider threats or attackers who have already compromised a system could escalate their privileges or lateral movement capabilities using the leaked credentials. This vulnerability does not directly affect system integrity or availability but compromises confidentiality, which is critical in cloud infrastructure. Organizations relying on python-glance-store for image management in OpenStack could face increased risk of credential theft, data breaches, and subsequent attacks on cloud services. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with lax logging controls or inadequate log file protections.

Mitigation Recommendations

To mitigate CVE-2024-1141, organizations should immediately review and adjust their logging configurations to avoid enabling DEBUG level logging in production or sensitive environments. Restrict DEBUG logging to trusted administrators and ensure that logs containing sensitive information are stored securely with strict access controls and encryption where possible. Implement log sanitization or filtering mechanisms to prevent sensitive credentials from being recorded. Regularly audit log files for accidental exposure of secrets and rotate credentials if exposure is suspected. Additionally, monitor for updates or patches from the python-glance-store maintainers or OpenStack community and apply them promptly once available. Employ the principle of least privilege to limit local access to systems running python-glance-store, reducing the risk of exploitation. Finally, integrate security awareness about logging best practices into development and operations teams to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-02-01T00:47:57.686Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eee7

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 2/28/2026, 8:10:11 AM

Last updated: 3/25/2026, 7:33:34 PM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses