CVE-2022-47950

An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
References
Link Resource
https://security.openstack.org/ossa/OSSA-2023-001.html Patch Vendor Advisory
https://launchpad.net/bugs/1998625 Exploit Issue Tracking Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:swift:2.30.0:*:*:*:*:*:*:*
cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2023-01-18 09:15

Updated : 2023-01-30 07:09


NVD link : CVE-2022-47950

Mitre link : CVE-2022-47950


JSON object : View

CWE
CWE-552

Files or Directories Accessible to External Parties

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

openstack

  • swift