First published: Thu Oct 20 2022(Updated: )
An an information leak was discovered in OpenStack's undercloud. Rsync stores sensitive swift data (for example administrative credentials to the overcloud) in a manner that makes this information visible to local users of the undercloud. This enables potentially anyone with network access to the undercloud to further gain access to the rest of an OpenStack deployment.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack Platform | =13.0 | |
Redhat Openstack Platform | =13.0 | |
redhat/instack-undercloud | <0:8.4.9-13.el7 | 0:8.4.9-13.el7 |
The rsync daemon is no longer needed and can be manually disabled by running the following commands on the undercloud: sudo rm /etc/xinetd.d/rsync /etc/rsyncd.conf sudo systemctl restart xinetd However, this will be reverted if the undercloud gets updated.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3596 is a vulnerability found in OpenStack's undercloud that allows unauthenticated remote attackers to inspect sensitive data after discovering the IP address of the undercloud.
The severity of CVE-2022-3596 is high with a CVSS score of 7.5.
CVE-2022-3596 affects Redhat Openstack Platform 13.0, allowing unauthenticated remote attackers to inspect sensitive data.
CVE-2022-3596 can be exploited by unauthenticated remote attackers who discover the IP address of the undercloud to access and inspect sensitive data.
Yes, a fix is available for CVE-2022-3596. Users should apply the appropriate patches provided by Redhat Openstack Platform.