{"id":"CVE-2023-1625","details":"An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.","aliases":["GHSA-5836-grcc-8j89"],"modified":"2026-02-20T02:32:28.454365Z","published":"2023-09-24T01:15:43.577Z","related":["SUSE-SU-2023:2378-1","SUSE-SU-2023:2379-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-1625"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181621"},{"type":"ADVISORY","url":"https://launchpad.net/bugs/1999665"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181621"},{"type":"REPORT","url":"https://launchpad.net/bugs/1999665"},{"type":"FIX","url":"https://github.com/openstack/heat/commit/a49526c278e52823080c7f3fcb72785b93fd4dcb"},{"type":"EVIDENCE","url":"https://launchpad.net/bugs/1999665"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openstack/heat","events":[{"introduced":"0"},{"fixed":"a49526c278e52823080c7f3fcb72785b93fd4dcb"}]}],"versions":["10.0.0.0b1","10.0.0.0b2","10.0.0.0b3","10.0.0.0rc1","11.0.0.0b1","11.0.0.0b2","11.0.0.0b3","11.0.0.0rc1","12.0.0.0rc1","13.0.0.0rc1","14.0.0","14.0.0.0rc1","15.0.0","15.0.0.0rc1","16.0.0","16.0.0.0rc1","17.0.0.0rc1","18.0.0","18.0.0.0rc1","19.0.0.0rc1","2013.1.rc1","2013.2.b1","2013.2.b2","2013.2.b3","2013.2.rc1","2014.1.b1","2014.1.b2","2014.1.rc1","2014.2","2014.2.b1","2014.2.b2","2014.2.b3","2014.2.rc1","2014.2.rc2","2014.2.rc3","2015.1.0","2015.1.0b1","2015.1.0b2","2015.1.0b3","2015.1.0rc1","2015.1.0rc2","5.0.0","5.0.0.0b1","5.0.0.0b2","5.0.0.0b3","5.0.0.0rc1","5.0.0.0rc2","5.0.0a0","6.0.0","6.0.0.0b1","6.0.0.0b2","6.0.0.0b3","6.0.0.0rc1","6.0.0.0rc2","6.0.0.0rc3","7.0.0.0b1","7.0.0.0b2","7.0.0.0b3","7.0.0.0rc1","8.0.0.0b1","8.0.0.0b2","8.0.0.0b3","8.0.0.0rc1","9.0.0.0b1","9.0.0.0b2","9.0.0.0b3","9.0.0.0rc1","grizzly-2","v2-M1.release","v3.release","v4-branch-eol","v4.release","v5-branch-eol","v5.release","v6-branch-eol","v6.release","v7-branch-eol"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1625.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}]}