First published: Fri Nov 19 2021(Updated: )
An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of service by consuming protected resources.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Barbican | <14.0.0 | |
Redhat Openstack Platform | =13.0 | |
Redhat Openstack Platform | =16.1 | |
Redhat Openstack Platform | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23451.
The title of this vulnerability is 'An authorization flaw was found in openstack-barbican'.
The severity of CVE-2022-23451 is high with a severity value of 8.1.
OpenStack Barbican, Redhat Openstack Platform versions 13.0, 16.1, and 16.2 are affected by CVE-2022-23451.
An attacker on the network can exploit CVE-2022-23451 to modify or delete protected data by using the default policy rules for the secret metadata API.