NA

CVE-2022-3100

Published: 18/01/2023 Updated: 26/01/2023
CVSS v3 Base Score: 5.9 | Impact Score: 4.2 | Exploitability Score: 1.6
VMScore: 0

Vulnerability Summary

A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack barbican -

redhat openstack 16.1

redhat openstack 16.2

redhat openstack for ibm power 16.1

redhat openstack 13

redhat openstack for ibm power 13

redhat openstack for ibm power 16.2

redhat openstack 17

redhat openstack_platform 13.0

Vendor Advisories

Synopsis Important: Red Hat OpenStack Platform (openstack-barbican) security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openstack-barbican is now available for Red Hat OpenStackPlatformRed Hat P ...
Debian Bug report logs - #1021139 barbican: CVE-2022-3100 Package: src:barbican; Maintainer for src:barbican is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 2 Oct 2022 18:15:07 UTC Severity: grave Tags: security, upstream Reply or subscribe t ...
Douglas Mendizabal discovered that Barbican, the OpenStack Key Management Service, incorrectly parsed requests which could allow an authenticated user to bypass Barbican access policies For the stable distribution (bullseye), this problem has been fixed in version 1:1100-3+deb11u1 We recommend that you upgrade your barbican packages For the de ...
Description<!----> A flaw was found in the openstack-barbican component This issue allows an access policy bypass via a query string when accessing the API A flaw was found in the openstack-barbican component This issue allows an access policy bypass via a query string when accessing the API ...