CVE-2022-3146

A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:tripleo_ansible:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-03-23 21:15

Updated : 2024-02-28 20:13


NVD link : CVE-2022-3146

Mitre link : CVE-2022-3146

CVE.ORG link : CVE-2022-3146


JSON object : View

Products Affected

openstack

  • tripleo_ansible

redhat

  • openstack_for_ibm_power
  • openstack
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-276

Incorrect Default Permissions

CWE-732

Incorrect Permission Assignment for Critical Resource