CVE-2022-23452
Published: 28 January 2022
An authorization flaw was found in openstack-barbican, where anyone with an admin role could add secrets to a different project container. This flaw allows an attacker on the network to consume protected resources and cause a denial of service.
Priority
Status
Package | Release | Status |
---|---|---|
barbican Launchpad, Ubuntu, Debian |
bionic |
Released
(1:6.0.1-0ubuntu1.1)
|
focal |
Released
(1:10.1.0-0ubuntu2.1)
|
|
impish |
Released
(2:13.0.0-0ubuntu1.2)
|
|
jammy |
Not vulnerable
(2:14.0.0-0ubuntu1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(14.0.0)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://opendev.org/openstack/barbican/commit/6c841b23afa8ed6fa4cd01ba1a6bebfb60f06ae5 (master) upstream: https://opendev.org/openstack/barbican/commit/bbb87ea8d66be300093a66723aef5ed4cf8b6b78 (13.x) upstream: https://opendev.org/openstack/barbican/commit/a8226fcf33f16078d92949af23bdf41a7593bb64 (12.x) upstream: https://opendev.org/openstack/barbican/commit/7cf500a98239e861f877539827f3be57c920b95c (11.x) upstream: https://opendev.org/openstack/barbican/commit/54e342fa7cf15cb77b2bc4b330c5b8fa41678881 (10.x) upstream: https://opendev.org/openstack/barbican/commit/ecfef01555b299e3b58392208d1630ed84ca6717 (9.x) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.9 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |