Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ggjr-2f7v-vhq4

Опубликовано: 01 июн. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Kiali Authentication Bypass vulnerability

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy OpenID is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID implicit flow is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

Пакеты

Наименование

github.com/kiali/kiali

go
Затронутые версииВерсия исправления

< 1.31.0

1.31.0

EPSS

Процентиль: 37%
0.00162
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-290

Связанные уязвимости

CVSS3: 7.2
redhat
почти 5 лет назад

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

CVSS3: 6.5
nvd
больше 4 лет назад

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

EPSS

Процентиль: 37%
0.00162
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-290