A flaw was found in OpenShift Container Platform where OAuth tokens are not encrypted when the encryption of data at rest is enabled. This flaw allows an attacker with access to a backup to obtain OAuth tokens and then use them to log into the cluster as any user who logged into the cluster via the WebUI or via the command line in the last 24 hours. Once the backup is older than 24 hours the OAuth tokens are no longer valid.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.3 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 - Issue Tracking, Vendor Advisory |
Information
Published : 2020-05-12 14:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10706
Mitre link : CVE-2020-10706
CVE.ORG link : CVE-2020-10706
JSON object : View
Products Affected
redhat
- openshift_container_platform
CWE
CWE-312
Cleartext Storage of Sensitive Information