An information leak was found in OpenStack's undercloud. This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42960 | An information leak was found in OpenStack's undercloud. This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials. |
Fixes
Solution
No solution given by the vendor.
Workaround
The rsync daemon is no longer needed and can be manually disabled by running the following commands on the undercloud: sudo rm /etc/xinetd.d/rsync /etc/rsyncd.conf sudo systemctl restart xinetd However, this will be reverted if the undercloud gets updated.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T01:14:02.457Z
Reserved: 2022-10-18T23:34:01.540Z
Link: CVE-2022-3596
Updated: 2024-08-03T01:14:02.457Z
Status : Modified
Published: 2023-09-20T20:15:11.217
Modified: 2024-11-21T07:19:50.660
Link: CVE-2022-3596
OpenCVE Enrichment
No data.
EUVD