Описание
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Service Interconnect 1 | skupper | Affected | ||
| Service Interconnect 1.4 for RHEL 9 | service-interconnect/skupper-flow-collector-rhel9 | Fixed | RHSA-2024:4865 | 25.07.2024 |
| Service Interconnect 1.4 for RHEL 9 | service-interconnect/skupper-service-controller-rhel9 | Fixed | RHSA-2024:4865 | 25.07.2024 |
| Service Interconnect 1 for RHEL 9 | service-interconnect/skupper-flow-collector-rhel9 | Fixed | RHSA-2024:4871 | 25.07.2024 |
| Service Interconnect 1 for RHEL 9 | service-interconnect/skupper-service-controller-rhel9 | Fixed | RHSA-2024:4871 | 25.07.2024 |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Skupper uses a static cookie secret for the openshift oauth-proxy
Уязвимость пакета Skupper программного средства управления и интеграции микросервисов в облачных и гибридных средах Red Hat Service Interconnect, позволяющая нарушителю обойти процесс аутентификации
5.3 Medium
CVSS3