Introduce a new test for "cve_2022_3100"

The exploit is that a malicious user with a Keystone account is able to decrypt
any secret as long as they know the secret's ID by using a specifically crafted
query string:
GET /v1/secrets/{secret-id}/payload?target.secret.read=read

Change-Id: I5e00a188268ef1c25eed8bf3a37197918e529427
2 files changed