CVE-2019-10225

A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1743073 Issue Tracking Mitigation Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1743073 Issue Tracking Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1743073 - Issue Tracking, Mitigation, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1743073 - Issue Tracking, Mitigation, Third Party Advisory

Information

Published : 2021-03-19 21:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10225

Mitre link : CVE-2019-10225

CVE.ORG link : CVE-2019-10225


JSON object : View

Products Affected

redhat

  • openshift
  • openshift_container_platform
CWE
CWE-522

Insufficiently Protected Credentials