Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qq85-wpwr-7p33

Опубликовано: 02 сент. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

EPSS

Процентиль: 45%
0.00227
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 6.3
redhat
больше 3 лет назад

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

CVSS3: 6.3
nvd
больше 3 лет назад

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

EPSS

Процентиль: 45%
0.00227
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-400