First published: Wed Jan 18 2023(Updated: )
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Barbican | ||
Redhat Openstack | =13 | |
Redhat Openstack | =16.1 | |
Redhat Openstack | =16.2 | |
Redhat Openstack | =17 | |
Redhat Openstack For Ibm Power | =13 | |
Redhat Openstack For Ibm Power | =16.1 | |
Redhat Openstack For Ibm Power | =16.2 | |
Redhat Openstack Platform | =13.0 | |
Redhat Enterprise Linux Eus | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3100 is a vulnerability found in the openstack-barbican component that allows an access policy bypass via a query string when accessing the API.
CVE-2022-3100 has a severity rating of 5.9, which is considered medium.
The OpenStack Barbican component and various versions of Redhat Openstack, Redhat Openstack for IBM Power, and Redhat Openstack Platform are affected by CVE-2022-3100.
To fix CVE-2022-3100, it is recommended to apply the necessary patches or updates provided by the vendor.
More information about CVE-2022-3100 can be found at the following reference: https://access.redhat.com/security/cve/CVE-2022-3100