GHSA-p2jg-q8hw-p7gc

Suggest an improvement
Source
https://github.com/advisories/GHSA-p2jg-q8hw-p7gc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-p2jg-q8hw-p7gc/GHSA-p2jg-q8hw-p7gc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p2jg-q8hw-p7gc
Aliases
Published
2022-09-07T00:01:53Z
Modified
2023-11-08T04:08:18.185361Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Barbican authorization flaw before v14.0.0
Details

An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of service by consuming protected resources.

Database specific
{
    "nvd_published_at": "2022-09-06T18:15:00Z",
    "github_reviewed_at": "2022-09-15T03:22:08Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

PyPI / barbican

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.0.0

Affected versions

Other

0

6.*

6.0.0.0b1

8.*

8.0.0.0rc1
8.0.0
8.0.1

9.*

9.0.0.0rc1
9.0.0
9.0.1

10.*

10.0.0.0rc1
10.0.0
10.1.0

11.*

11.0.0.0rc1
11.0.0

12.*

12.0.0.0rc1
12.0.0.0rc2
12.0.0
12.0.1
12.0.2

13.*

13.0.0.0rc1
13.0.0
13.0.1
13.0.2

14.*

14.0.0.0rc1