Vulnerability Description
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openstack | Swift | < 2.28.1 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://launchpad.net/bugs/1998625ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/01/msg00021.htmlMailing ListThird Party Advisory
- https://security.openstack.org/ossa/OSSA-2023-001.htmlPatchVendor Advisory
- https://www.debian.org/security/2023/dsa-5327
- https://launchpad.net/bugs/1998625ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/01/msg00021.htmlMailing ListThird Party Advisory
- https://security.openstack.org/ossa/OSSA-2023-001.htmlPatchVendor Advisory
- https://www.debian.org/security/2023/dsa-5327
FAQ
What is CVE-2022-47950?
CVE-2022-47950 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file co...
How severe is CVE-2022-47950?
CVE-2022-47950 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47950?
Check the references section above for vendor advisories and patch information. Affected products include: Openstack Swift, Debian Debian Linux.