First published: Fri Nov 19 2021(Updated: )
An authorization flaw was found in openstack-barbican, where anyone with an admin role could add secrets to a different project container. This flaw allows an attacker on the network to consume protected resources and cause a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Barbican | <14.0.0 | |
Redhat Openstack Platform | =16.1 | |
pip/barbican | <14.0.0 | 14.0.0 |
<14.0.0 | ||
=16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23452 is an authorization flaw in openstack-barbican that allows anyone with an admin role to add secrets to a different project container, leading to potential resource consumption and denial of service.
CVE-2022-23452 allows an attacker with admin role to add secrets to a different project container, enabling them to consume protected resources and cause denial of service.
OpenStack Barbican versions up to and excluding 14.0.0 are affected by CVE-2022-23452.
To mitigate CVE-2022-23452, it is recommended to update OpenStack Barbican to a version higher than 14.0.0 or apply the necessary patches.
You can find more information about CVE-2022-23452 in the following references: - [Red Hat Bugzilla - CVE-2022-23452](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2022908) - [OpenStack Storyboard - CVE-2022-23452](https://storyboard.openstack.org/#!/story/2009297) - [Red Hat Bugzilla - CVE-2022-23452 Patch](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2043278)