A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA11260 | Vendor Advisory |
https://kb.juniper.net/JSA11260 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA11260 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 7.7 |
Information
Published : 2022-01-19 01:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22152
Mitre link : CVE-2022-22152
CVE.ORG link : CVE-2022-22152
JSON object : View
Products Affected
juniper
- contrail_service_orchestration
CWE
CWE-693
Protection Mechanism Failure