Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2022-3596", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "state": "PUBLISHED", "assignerShortName": "redhat", "dateReserved": "2022-10-18T23:34:01.540Z", "datePublished": "2023-09-20T19:06:28.487Z", "dateUpdated": "2024-08-03T01:14:02.457Z"}, "containers": {"cna": {"title": "Instack-undercloud: rsync leaks information to undercloud", "metrics": [{"other": {"content": {"value": "Important", "namespace": "https://access.redhat.com/security/updates/classification/"}, "type": "Red Hat severity rating"}}, {"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS"}], "descriptions": [{"lang": "en", "value": "An information leak was found in OpenStack's undercloud. This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials."}], "affected": [{"vendor": "Red Hat", "product": "Red Hat OpenStack Platform 13.0 - ELS", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "instack-undercloud", "defaultStatus": "affected", "versions": [{"version": "0:8.4.9-13.el7ost", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:openstack:13::el7"]}, {"vendor": "Red Hat", "product": "Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "packageName": "instack-undercloud", "defaultStatus": "affected", "versions": [{"version": "0:8.4.9-13.el7ost", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:openstack:13::el7"]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2022:8897", "name": "RHSA-2022:8897", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/security/cve/CVE-2022-3596", "tags": ["vdb-entry", "x_refsource_REDHAT"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136596", "name": "RHBZ#2136596", "tags": ["issue-tracking", "x_refsource_REDHAT"]}], "datePublic": "2022-12-05T00:00:00+00:00", "problemTypes": [{"descriptions": [{"cweId": "CWE-402", "description": "Transmission of Private Resources into a New Sphere ('Resource Leak')", "lang": "en", "type": "CWE"}]}], "x_redhatCweChain": "CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak')", "workarounds": [{"lang": "en", "value": "The rsync daemon is no longer needed and can be manually disabled by running the following commands on the undercloud:\n\n sudo rm /etc/xinetd.d/rsync /etc/rsyncd.conf \n sudo systemctl restart xinetd\n\nHowever, this will be reverted if the undercloud gets updated."}], "timeline": [{"lang": "en", "time": "2022-10-04T00:00:00+00:00", "value": "Reported to Red Hat."}, {"lang": "en", "time": "2022-12-05T00:00:00+00:00", "value": "Made public."}], "credits": [{"lang": "en", "value": "Red Hat would like to thank Maciej Relewicz (Juniper Networks) for reporting this issue."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2024-05-03T15:32:25.112Z"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2022-3596", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-05-03T19:52:27.052407Z"}}}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:15:32.341Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T01:14:02.457Z"}, "title": "CVE Program Container", "references": [{"url": "https://access.redhat.com/errata/RHSA-2022:8897", "name": "RHSA-2022:8897", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/security/cve/CVE-2022-3596", "tags": ["vdb-entry", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136596", "name": "RHBZ#2136596", "tags": ["issue-tracking", "x_refsource_REDHAT", "x_transferred"]}]}]}}