Описание
Skupper uses a static cookie secret for the openshift oauth-proxy
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-6535
- https://github.com/skupperproject/skupper/commit/d2cb3782e807853694ee66b6e3d4a1917485eb71
- https://access.redhat.com/errata/RHSA-2024:4865
- https://access.redhat.com/errata/RHSA-2024:4871
- https://access.redhat.com/security/cve/CVE-2024-6535
- https://bugzilla.redhat.com/show_bug.cgi?id=2296024
Пакеты
github.com/skupperproject/skupper
< 0.0.0-20240703184342-c26bce4079ff
0.0.0-20240703184342-c26bce4079ff
EPSS
8.2 High
CVSS4
5.9 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Уязвимость пакета Skupper программного средства управления и интеграции микросервисов в облачных и гибридных средах Red Hat Service Interconnect, позволяющая нарушителю обойти процесс аутентификации
EPSS
8.2 High
CVSS4
5.9 Medium
CVSS3