CVE Vulnerabilities

CVE-2022-3100

Authentication Bypass by Primary Weakness

Published: Jan 18, 2023 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.1 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
Ubuntu
MEDIUM

A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.

Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Affected Software

Name Vendor Start Version End Version
Barbican Openstack - (including) - (including)
Red Hat OpenStack Platform 13.0 - ELS RedHat openstack-barbican-0:6.0.1-6.el7ost *
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS RedHat openstack-barbican-0:6.0.1-6.el7ost *
Red Hat OpenStack Platform 16.1 RedHat openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost *
Red Hat OpenStack Platform 16.2 RedHat openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost *
Red Hat OpenStack Platform 17.0 RedHat openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost *
Barbican Ubuntu bionic *
Barbican Ubuntu esm-apps/xenial *
Barbican Ubuntu focal *
Barbican Ubuntu jammy *
Barbican Ubuntu trusty *
Barbican Ubuntu xenial *

References