Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10752

Опубликовано: 10 июн. 2020
Источник: redhat
CVSS3: 7.1

Описание

A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.

Отчет

OAuthTokens are only valid for 1 day by default.

Меры по смягчению последствий

Ensure the OpenShift API Server logs are kept private

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftAffected
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-apiserver-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-522
https://bugzilla.redhat.com/show_bug.cgi?id=1839942openshift/openshift-apiserver: oauthtokens leaked to logs on panic

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.

github
больше 3 лет назад

A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.

7.1 High

CVSS3