A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2792 | |
https://access.redhat.com/errata/RHSA-2019:4053 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:2792 | |
https://access.redhat.com/errata/RHSA-2019:4053 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 4.2 |
References | () https://access.redhat.com/errata/RHSA-2019:2792 - | |
References | () https://access.redhat.com/errata/RHSA-2019:4053 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176 - Issue Tracking, Vendor Advisory |
Information
Published : 2019-08-02 15:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10176
Mitre link : CVE-2019-10176
CVE.ORG link : CVE-2019-10176
JSON object : View
Products Affected
redhat
- openshift_container_platform
CWE
CWE-352
Cross-Site Request Forgery (CSRF)