HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2016:1064 | Vendor Advisory |
https://github.com/openshift/origin/pull/8334 | Patch |
https://access.redhat.com/errata/RHSA-2016:1064 | Vendor Advisory |
https://github.com/openshift/origin/pull/8334 | Patch |
Configurations
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2016:1064 - Vendor Advisory | |
References | () https://github.com/openshift/origin/pull/8334 - Patch |
Information
Published : 2016-06-08 17:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3711
Mitre link : CVE-2016-3711
CVE.ORG link : CVE-2016-3711
JSON object : View
Products Affected
redhat
- openshift_origin
- openshift
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor