A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
References
Link | Resource |
---|---|
https://github.com/openshift/enhancements/pull/323 | Patch Third Party Advisory |
https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 | Third Party Advisory |
https://github.com/openshift/enhancements/pull/323 | Patch Third Party Advisory |
https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openshift/enhancements/pull/323 - Patch, Third Party Advisory | |
References | () https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 - Third Party Advisory |
Information
Published : 2020-06-12 23:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10752
Mitre link : CVE-2020-10752
CVE.ORG link : CVE-2020-10752
JSON object : View
Products Affected
redhat
- openshift_container_platform