Vulnerability Description
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Tripleo Ansible | - |
| Redhat | Openstack | 16.1 |
| Redhat | Openstack For Ibm Power | 16.1 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-3146Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-3146Vendor Advisory
FAQ
What is CVE-2022-3146?
CVE-2022-3146 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force...
How severe is CVE-2022-3146?
CVE-2022-3146 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3146?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Tripleo Ansible, Redhat Openstack, Redhat Openstack For Ibm Power.