CVE-2022-47950

An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
VendorProductVersion
openstackswift
𝑥
< 2.28.1
openstackswift
2.29.0 ≤
𝑥
< 2.29.2
openstackswift
2.30.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
swift
bullseye (security)
2.26.0-10+deb11u1
fixed
bullseye
2.26.0-10+deb11u1
fixed
bookworm
2.30.0-4
fixed
sid
2.34.0-4
fixed
trixie
2.34.0-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
swift
noble
Fixed 2.31.0+git2023020814.488f8c83-0ubuntu1
released
mantic
Fixed 2.31.0+git2023020814.488f8c83-0ubuntu1
released
lunar
Fixed 2.31.0+git2023020814.488f8c83-0ubuntu1
released
kinetic
Fixed 2.30.1-0ubuntu1
released
jammy
Fixed 2.29.2-0ubuntu1
released
focal
Fixed 2.25.2-0ubuntu1.1
released
bionic
not-affected
xenial
needed
trusty
ignored