Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1764

Опубликовано: 25 мар. 2020
Источник: redhat
CVSS3: 8.6

Описание

A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.

A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.

Отчет

If exploited, an attacker can perform all Kiali admin functions via the API including:

  • View the logs of a pod
  • View Istio metrics, tracing etc.
  • Alter Istio routing configurations:
  • Change the pod availability: adding variances to the weighting, i.e. all traffic goes to 1 pod, or 95% of all traffic.
  • Prevent traffic reaching a pod, DoS Whilst OpenShift ServiceMesh Kiali uses the default signing key for JWT cookies, it also includes an access_token. This token is generated with a successful login and cannot be easily determined. To access the Kiali API in this case, a valid session token would need to be captured first and then added to the JWT cookie.

Меры по смягчению последствий

The Kiali configuration can be manually updated for ServiceMesh so that the default signing_key cannot be easily determined: oc get kiali -n $(oc get kiali --all-namespaces --no-headers -o custom-columns=NS:.metadata.namespace) -o yaml | sed "s/spec:/spec:\n login_token:\n signing_key: $(chars=abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890; for i in {1..20}; do echo -n "${chars:RANDOM%${#chars}:1}"; done; echo)/" | oc apply -f -

Дополнительная информация

Статус:

Important
Дефект:
CWE-321
https://bugzilla.redhat.com/show_bug.cgi?id=1810383kiali: JWT cookie uses default signing key

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
около 5 лет назад

A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.

CVSS3: 8.6
github
около 4 лет назад

Hard coded cryptographic key in Kiali

CVSS3: 9.4
fstec
около 5 лет назад

Уязвимость консоли управления для сервисной сетки на основе Istio Kiali, связанная с использованием жестко закодированного ключа шифрования, позволяющая нарушителю повысить свои привилегии

oracle-oval
почти 5 лет назад

ELSA-2020-5765: Unbreakable Enterprise kernel-container kata-image kata-runtime kata kubernetes kubernetes istio olcne security update (IMPORTANT)

8.6 High

CVSS3