Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1741

Опубликовано: 13 мар. 2020
Источник: redhat
CVSS3: 5.9

Описание

A flaw was found in openshift-ansible. OpenShift Container Platform (OCP) 3.11 is too permissive in the way it specified CORS allowed origins during installation. An attacker, able to man-in-the-middle the connection between the user's browser and the openshift console, could use this flaw to perform a phishing attack. The main threat from this vulnerability is data confidentiality.

Меры по смягчению последствий

Ensure that the corsAllowedOrigin definition within master-config.yaml contains elements in the form

corsAllowedOrigins: - ^(?i)https://my\.subdomain\.domain\.com(:|\z)

and not the form

corsAllowedOrigins: - (?i)//my\.subdomain\.domain\.com(:|\z)

as the first will permit cross origin requests only if the host and protocol matches, whereas the second will permit a downgrade to http protocol for example.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-hypershiftNot affected
Red Hat OpenShift Container Platform 3.11openshift-ansibleFixedRHSA-2020:354127.08.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-185
https://bugzilla.redhat.com/show_bug.cgi?id=1802381openshift-ansible: cors allowed origin allows changing url protocol

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
почти 6 лет назад

A flaw was found in openshift-ansible. OpenShift Container Platform (OCP) 3.11 is too permissive in the way it specified CORS allowed origins during installation. An attacker, able to man-in-the-middle the connection between the user's browser and the openshift console, could use this flaw to perform a phishing attack. The main threat from this vulnerability is data confidentiality.

CVSS3: 5.9
github
больше 3 лет назад

A flaw was found in openshift-ansible. OpenShift Container Platform (OCP) 3.11 is too permissive in the way it specified CORS allowed origins during installation. An attacker, able to man-in-the-middle the connection between the user's browser and the openshift console, could use this flaw to perform a phishing attack. The main threat from this vulnerability is data confidentiality.

5.9 Medium

CVSS3