CVE-2020-10752

A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://github.com/openshift/enhancements/pull/323 - Patch, Third Party Advisory () https://github.com/openshift/enhancements/pull/323 - Patch, Third Party Advisory
References () https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 - Third Party Advisory () https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 - Third Party Advisory

Information

Published : 2020-06-12 23:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10752

Mitre link : CVE-2020-10752

CVE.ORG link : CVE-2020-10752


JSON object : View

Products Affected

redhat

  • openshift_container_platform
CWE
CWE-522

Insufficiently Protected Credentials

CWE-532

Insertion of Sensitive Information into Log File