CVE-2022-3100

A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
redhatCNA
---
---
CVEADP
---
---
CISA-ADPADP
5.9 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
VendorProductVersion
openstackbarbican
-
redhatopenstack
16.1
redhatopenstack
16.2
redhatopenstack_for_ibm_power
16.1
redhatopenstack_for_ibm_power
16.2
redhatopenstack_platform
13.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
barbican
bullseye (security)
1:11.0.0-3+deb11u1
fixed
bullseye
1:11.0.0-3+deb11u1
fixed
bookworm
1:15.0.1-2
fixed
sid
1:19.0.0-1
fixed
trixie
1:19.0.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
barbican
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
Fixed 2:14.0.0-0ubuntu1.1
released
focal
Fixed 1:10.1.0-0ubuntu2.2
released
bionic
Fixed 1:6.0.1-0ubuntu1.2
released
xenial
needed
trusty
ignored