A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/cve-2013-0196 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 | Exploit Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/cve-2013-0196 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/cve-2013-0196 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2019-12-30 22:15
Updated : 2024-11-21 01:47
NVD link : CVE-2013-0196
Mitre link : CVE-2013-0196
CVE.ORG link : CVE-2013-0196
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift
CWE
CWE-352
Cross-Site Request Forgery (CSRF)