Описание
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]SERVERID" cookie.
An information disclosure flaw was discovered in haproxy as used by OpenShift Enterprise; a cookie with the name "OPENSHIFT[namespace]_SERVERID" was set, which contained the internal IP address of a pod.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Enterprise 2 | haproxy | Not affected | ||
| Red Hat OpenShift Enterprise 2 | haproxy15side | Not affected | ||
| Red Hat OpenShift Container Platform 3.2 | nodejs-openshift-auth-proxy | Fixed | RHSA-2016:1064 | 12.05.2016 |
| Red Hat OpenShift Container Platform 3.2 | nodejs-proxy-addr | Fixed | RHSA-2016:1064 | 12.05.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
1.9 Low
CVSS2
Связанные уязвимости
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
EPSS
1.9 Low
CVSS2