An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
References
Link | Resource |
---|---|
https://launchpad.net/bugs/1996188 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00040.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00041.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00042.html | Mailing List Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2023-002.html | Patch Vendor Advisory |
https://www.debian.org/security/2023/dsa-5336 | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5337 | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5338 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Feb 2023, 17:27
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
CPE | cpe:2.3:a:openstack:cinder:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:* cpe:2.3:a:openstack:glance:*:*:*:*:*:*:*:* |
|
First Time |
Openstack nova
Debian debian Linux Debian Openstack cinder Openstack glance Openstack |
|
References | (MISC) https://launchpad.net/bugs/1996188 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5337 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/01/msg00042.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/01/msg00041.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/01/msg00040.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5336 - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5338 - Third Party Advisory | |
References | (CONFIRM) https://security.openstack.org/ossa/OSSA-2023-002.html - Patch, Vendor Advisory |
02 Feb 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jan 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-26 22:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-47951
Mitre link : CVE-2022-47951
CVE.ORG link : CVE-2022-47951
JSON object : View
Products Affected
debian
- debian_linux
openstack
- cinder
- glance
- nova
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')