Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10176

Опубликовано: 09 июл. 2019
Источник: redhat
CVSS3: 4.2
EPSS Низкий

Описание

A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack.

Отчет

OpenShift Container Platform versions prior to 3.11 do not contain the affected "cluster console" component and are not vulnerable to this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.6atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.7atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.9atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.11openshift3/ose-consoleFixedRHSA-2019:405316.12.2019
Red Hat OpenShift Container Platform 4.1openshift4/ose-consoleFixedRHSA-2019:279217.09.2019
Red Hat OpenShift Container Platform 4.2openshift4/ose-consoleFixedRHBA-2019:292216.10.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1712569atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL

EPSS

Процентиль: 31%
0.0012
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.2
nvd
больше 6 лет назад

A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack.

CVSS3: 5.4
github
больше 3 лет назад

A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack.

EPSS

Процентиль: 31%
0.0012
Низкий

4.2 Medium

CVSS3