An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
References
Link | Resource |
---|---|
https://launchpad.net/bugs/1998625 | Exploit Issue Tracking Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html | Mailing List Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2023-001.html | Patch Vendor Advisory |
https://www.debian.org/security/2023/dsa-5327 | |
https://launchpad.net/bugs/1998625 | Exploit Issue Tracking Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html | Mailing List Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2023-001.html | Patch Vendor Advisory |
https://www.debian.org/security/2023/dsa-5327 |
Configurations
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.net/bugs/1998625 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://security.openstack.org/ossa/OSSA-2023-001.html - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2023/dsa-5327 - | |
Summary |
|
07 Nov 2023, 03:56
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-01-18 17:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-47950
Mitre link : CVE-2022-47950
CVE.ORG link : CVE-2022-47950
JSON object : View
Products Affected
openstack
- swift
debian
- debian_linux
CWE
CWE-552
Files or Directories Accessible to External Parties