Vulnerability Description
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Tripleo Ansible | - |
| Redhat | Openstack | 16.1 |
| Redhat | Openstack For Ibm Power | 16.1 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-3101Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-3101Vendor Advisory
FAQ
What is CVE-2022-3101?
CVE-2022-3101 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force...
How severe is CVE-2022-3101?
CVE-2022-3101 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3101?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Tripleo Ansible, Redhat Openstack, Redhat Openstack For Ibm Power.