Public bug reported:

Using the tox target added in this review -
https://review.openstack.org/#/c/186752/

============================================================================================
>> Use of exec detected.
 - nova/cmd/manage.py::215
214             """
215             exec(compile(open(path).read(), path, 'exec'), locals(), 
globals())
216

>> Use of insecure MD5 hash function.
 - nova/utils.py::1131
1130        """returns string that represents hash of base_str (in hex 
format)."""
1131        return hashlib.md5(base_str).hexdigest()
1132

>> Pickle library appears to be in use, possible security issue.
 - nova/virt/xenapi/client/session.py::213
212             rv = self.call_plugin(plugin, fn, params)
213             return pickle.loads(rv)
214

>> Use of possibly insecure function - consider using safer ast.literal_eval.
 - nova/virt/xenapi/client/session.py::291
290                         # FIXME(comstud): eval is evil.
291                         params = eval(exc.details[3])
292                     except Exception:

>> Pickle library appears to be in use, possible security issue.
 - nova/virt/xenapi/fake.py::661
660         def _plugin_migration_transfer_vhd(self, method, args):
661             kwargs = pickle.loads(args['params'])['kwargs']
662             vdi_ref = self.xenapi_request('VDI.get_by_uuid',

>> Audit url open for permitted schemes. Allowing use of file:/ or custom 
>> schemes is often unexpected.
 - nova/virt/xenapi/vm_utils.py::1961
1960        try:
1961            xml = urllib.urlopen("%s://%s:%s@%s/vm_rrd?uuid=%s" % (
1962                server[0],
1963                CONF.xenserver.connection_username,
1964                CONF.xenserver.connection_password,
============================================================================================

** Affects: nova
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1460061

Title:
  Security issues reported by bandit

Status in OpenStack Compute (Nova):
  New

Bug description:
  Using the tox target added in this review -
  https://review.openstack.org/#/c/186752/

  
============================================================================================
  >> Use of exec detected.
   - nova/cmd/manage.py::215
  214           """
  215           exec(compile(open(path).read(), path, 'exec'), locals(), 
globals())
  216

  >> Use of insecure MD5 hash function.
   - nova/utils.py::1131
  1130      """returns string that represents hash of base_str (in hex 
format)."""
  1131      return hashlib.md5(base_str).hexdigest()
  1132

  >> Pickle library appears to be in use, possible security issue.
   - nova/virt/xenapi/client/session.py::213
  212           rv = self.call_plugin(plugin, fn, params)
  213           return pickle.loads(rv)
  214

  >> Use of possibly insecure function - consider using safer ast.literal_eval.
   - nova/virt/xenapi/client/session.py::291
  290                       # FIXME(comstud): eval is evil.
  291                       params = eval(exc.details[3])
  292                   except Exception:

  >> Pickle library appears to be in use, possible security issue.
   - nova/virt/xenapi/fake.py::661
  660       def _plugin_migration_transfer_vhd(self, method, args):
  661           kwargs = pickle.loads(args['params'])['kwargs']
  662           vdi_ref = self.xenapi_request('VDI.get_by_uuid',

  >> Audit url open for permitted schemes. Allowing use of file:/ or custom 
schemes is often unexpected.
   - nova/virt/xenapi/vm_utils.py::1961
  1960      try:
  1961          xml = urllib.urlopen("%s://%s:%s@%s/vm_rrd?uuid=%s" % (
  1962              server[0],
  1963              CONF.xenserver.connection_username,
  1964              CONF.xenserver.connection_password,
  
============================================================================================

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1460061/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to