Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14845

Опубликовано: 07 окт. 2019
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

A vulnerability was found in OpenShift builds, versions 4.1 up to 4.3. Builds that extract source from a container image, bypass the TLS hostname verification. An attacker can take advantage of this flaw by launching a man-in-the-middle attack and injecting malicious content.

A vulnerability was found in OpenShift builds. Builds that extract source from a container image, bypass the TLS hostname verification. An attacker can take advantage of this flaw by launching a man-in-the-middle attack and injecting malicious content.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.9atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4.1openshift4/ose-docker-builderFixedRHSA-2019:423719.12.2019
Red Hat OpenShift Container Platform 4.2openshift4/ose-docker-builderFixedRHSA-2019:410111.12.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-494
https://bugzilla.redhat.com/show_bug.cgi?id=1754662openshift: Container image TLS verification bypass

EPSS

Процентиль: 13%
0.00043
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 6 лет назад

A vulnerability was found in OpenShift builds, versions 4.1 up to 4.3. Builds that extract source from a container image, bypass the TLS hostname verification. An attacker can take advantage of this flaw by launching a man-in-the-middle attack and injecting malicious content.

CVSS3: 5.3
fstec
больше 6 лет назад

Уязвимость платформа приложений-контейнеров OpenShift, связанная с загрузкой кода без проверки его целостности, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 13%
0.00043
Низкий

5.7 Medium

CVSS3