CVE-2022-3146

A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:tripleo_ansible:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2022-3146 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2022-3146 - Vendor Advisory

Information

Published : 2023-03-23 21:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-3146

Mitre link : CVE-2022-3146

CVE.ORG link : CVE-2022-3146


JSON object : View

Products Affected

openstack

  • tripleo_ansible

redhat

  • openstack
  • openstack_for_ibm_power
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-276

Incorrect Default Permissions

CWE-732

Incorrect Permission Assignment for Critical Resource