CVE-2022-47950
openstack-swift: Arbitrary file access through custom S3 XML entities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
Se descubrió un problema en OpenStack Swift anterior a 2.28.1, 2.29.x anterior a 2.29.2 y 2.30.0. Al proporcionar archivos XML manipulados, un usuario autenticado puede obligar a la API de S3 a devolver contenidos de archivos arbitrarios desde el servidor host, lo que resulta en un acceso de lectura no autorizado a datos potencialmente confidenciales. Esto afecta tanto a las implementaciones de s3api (Rocky o posterior) como a las implementaciones de swift3 (Queens y anteriores, que ya no se desarrollan activamente).
A flaw was found in Swift's S3 XML parser. By supplying specially crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This issue impacts both s3api deployments (Rocky or later) and swift3 deployments (Queens and earlier, no longer actively developed). Only deployments with S3 compatibility enabled are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-12-24 CVE Reserved
- 2023-01-18 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-08-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-552: Files or Directories Accessible to External Parties
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://launchpad.net/bugs/1998625 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://security.openstack.org/ossa/OSSA-2023-001.html | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2023/dsa-5327 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2022-47950 | 2023-03-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2160618 | 2023-03-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openstack Search vendor "Openstack" | Swift Search vendor "Openstack" for product "Swift" | < 2.28.1 Search vendor "Openstack" for product "Swift" and version " < 2.28.1" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Swift Search vendor "Openstack" for product "Swift" | >= 2.29.0 < 2.29.2 Search vendor "Openstack" for product "Swift" and version " >= 2.29.0 < 2.29.2" | - |
Affected
| ||||||
Openstack Search vendor "Openstack" | Swift Search vendor "Openstack" for product "Swift" | 2.30.0 Search vendor "Openstack" for product "Swift" and version "2.30.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|