CVE-2016-3711

HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:50

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2016:1064 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2016:1064 - Vendor Advisory
References () https://github.com/openshift/origin/pull/8334 - Patch () https://github.com/openshift/origin/pull/8334 - Patch

Information

Published : 2016-06-08 17:59

Updated : 2024-11-21 02:50


NVD link : CVE-2016-3711

Mitre link : CVE-2016-3711

CVE.ORG link : CVE-2016-3711


JSON object : View

Products Affected

redhat

  • openshift_origin
  • openshift
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor