First published: Thu Mar 23 2023(Updated: )
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Tripleo Ansible | ||
Redhat Openstack | =16.1 | |
Redhat Openstack | =16.2 | |
Redhat Openstack For Ibm Power | =16.1 | |
Redhat Openstack For Ibm Power | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3146 is a vulnerability found in tripleo-ansible that allows a local attacker to use brute force to explore a directory and discover a sensitive file, leading to information disclosure.
CVE-2022-3146 has a severity rating of 5.5 (medium).
The following software versions are affected: Openstack Tripleo Ansible, Redhat Openstack 16.1, Redhat Openstack 16.2, Redhat Openstack For Ibm Power 16.1, and Redhat Openstack For Ibm Power 16.2.
CVE-2022-3146 affects the affected software by having an insecure default configuration that does not sufficiently restrict the permissions of a sensitive file. This allows a local attacker to explore the relevant directory and discover the file, leading to information disclosure.
To fix CVE-2022-3146, it is recommended to apply the relevant security patch provided by the software vendor.