Safety vulnerability ID: 53828
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
https://github.com/advisories/GHSA-w4x6-6w3r-9h2m
Latest version: 6.0.0
Ansible assets for the TripleO project.
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment. See CVE-2022-3146.
MISC:https://access.redhat.com/security/cve/CVE-2022-3146: https://access.redhat.com/security/cve/CVE-2022-3146
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application