Vulnerability Details : CVE-2022-3146
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
Vulnerability category: Directory traversalInformation leak
Products affected by CVE-2022-3146
- cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*
- cpe:2.3:a:openstack:tripleo_ansible:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-3146
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-3146
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2022-3146
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2022-3146
-
https://access.redhat.com/security/cve/CVE-2022-3146
CVE-2022-3146- Red Hat Customer PortalVendor Advisory
Jump to