CVE-2013-0196

A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
References
Link Resource
https://access.redhat.com/security/cve/cve-2013-0196 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 Exploit Issue Tracking Third Party Advisory
https://access.redhat.com/security/cve/cve-2013-0196 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:redhat:openshift:1.2:*:*:*:enterprise:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/cve-2013-0196 - Third Party Advisory () https://access.redhat.com/security/cve/cve-2013-0196 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2019-12-30 22:15

Updated : 2024-11-21 01:47


NVD link : CVE-2013-0196

Mitre link : CVE-2013-0196

CVE.ORG link : CVE-2013-0196


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • openshift
CWE
CWE-352

Cross-Site Request Forgery (CSRF)