Miggo Logo

CVE-2023-1636:
OpenStack Barbican information disclosure vulnerability

6

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
9/24/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
barbicanpip<= 16.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from container configuration (shared CGROUP/USER/NET namespaces in all-in-one deployments) rather than specific code functions. The exposure occurs at the system/container orchestration level when services share namespaces, allowing cross-container access if compromised. No specific functions in the Barbican codebase are identified as vulnerable because the root cause is environmental misconfiguration rather than flawed application logic. The CWE-653 (Improper Isolation) classification supports this analysis. Without commit diffs or patch details, there's insufficient evidence to attribute the vulnerability to particular functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in Op*nSt**k **r*i**n *ont*in*rs. T*is vuln*r**ility is only *ppli***l* to **ploym*nts t**t utiliz* *n *ll-in-on* *on*i*ur*tion. **r*i**n *ont*in*rs s**r* t** s*m* **ROUP, US*R, *n* N*T n*m*sp*** wit* t** *ost syst*m *n* ot*

Reasoning

T** vuln*r**ility st*ms *rom *ont*in*r *on*i*ur*tion (s**r** **ROUP/US*R/N*T n*m*sp***s in *ll-in-on* **ploym*nts) r*t**r t**n sp**i*i* *o** *un*tions. T** *xposur* o**urs *t t** syst*m/*ont*in*r or***str*tion l*v*l w**n s*rvi**s s**r* n*m*sp***s, *l