First published: Sat Mar 25 2023(Updated: )
A barbican configuration file is set to world-readable in Red Hat OpenStack. This presents a security risk as it allows authenticated attacker with limited access to the file to view its contents, including secure credential.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Barbican | ||
Redhat Openstack Platform | =16.1 | |
Redhat Openstack Platform | =16.2 | |
Redhat Openstack Platform | =17.0 | |
pip/barbican | <=16.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1633 is a credentials leak flaw found in OpenStack Barbican, which allows a local authenticated attacker to read the configuration file and gain access to sensitive credentials.
CVE-2023-1633 affects OpenStack Barbican by allowing a local authenticated attacker to read the configuration file and gain access to sensitive credentials.
CVE-2023-1633 has a severity rating of medium with a CVSS score of 6.6.
Versions up to and including 16.0.0 of OpenStack Barbican are affected by CVE-2023-1633.
To fix CVE-2023-1633, update to a version of OpenStack Barbican that is not affected by the vulnerability.