Lucene search

K
cvelistRedhatCVELIST:CVE-2023-1633
HistorySep 24, 2023 - 12:09 a.m.

CVE-2023-1633 Insecure barbican configuration file leaking credential

2023-09-2400:09:50
CWE-200
redhat
www.cve.org
5
cve-2023-1633
credentials leak
openstack barbican

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

AI Score

6.2

Confidence

High

EPSS

0

Percentile

5.1%

A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.

CNA Affected

[
  {
    "product": "openstack-barbican",
    "vendor": "n/a",
    "defaultStatus": "affected"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 13 (Queens)",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "unknown",
    "cpes": [
      "cpe:/a:redhat:openstack:13"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:16.1"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.2",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:16.2"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 17.0",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:17.0"
    ]
  },
  {
    "product": "OpenStack RDO",
    "vendor": "RDO",
    "collectionURL": "https://repos.fedorapeople.org/repos/openstack/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected"
  }
]

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

AI Score

6.2

Confidence

High

EPSS

0

Percentile

5.1%