A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105190 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10937 | Issue Tracking Third Party Advisory |
https://github.com/openshift/console/commit/d56666852da6e7309a2e63a49f49a72ff66d309c | Exploit Third Party Advisory |
https://github.com/openshift/console/pull/461 | Third Party Advisory |
http://www.securityfocus.com/bid/105190 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10937 | Issue Tracking Third Party Advisory |
https://github.com/openshift/console/commit/d56666852da6e7309a2e63a49f49a72ff66d309c | Exploit Third Party Advisory |
https://github.com/openshift/console/pull/461 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 4.6 |
References | () http://www.securityfocus.com/bid/105190 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10937 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/openshift/console/commit/d56666852da6e7309a2e63a49f49a72ff66d309c - Exploit, Third Party Advisory | |
References | () https://github.com/openshift/console/pull/461 - Third Party Advisory |
Information
Published : 2018-09-11 16:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10937
Mitre link : CVE-2018-10937
CVE.ORG link : CVE-2018-10937
JSON object : View
Products Affected
redhat
- openshift_container_platform
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')