First published: Thu Mar 23 2023(Updated: )
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Tripleo Ansible | ||
Redhat Openstack | =16.1 | |
Redhat Openstack | =16.2 | |
Redhat Openstack For Ibm Power | =16.1 | |
Redhat Openstack For Ibm Power | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3101 is a vulnerability found in tripleo-ansible that allows a local attacker to discover a sensitive file through brute force, leading to information disclosure.
The severity of CVE-2022-3101 is medium, with a severity value of 5.5.
The affected software includes Openstack Tripleo Ansible, Redhat Openstack versions 16.1 and 16.2, and Redhat Openstack For IBM Power versions 16.1 and 16.2.
A local attacker can exploit CVE-2022-3101 by using brute force to explore the relevant directory and discover the sensitive file, leading to information disclosure.
More information about CVE-2022-3101 can be found at: https://access.redhat.com/security/cve/CVE-2022-3101