An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1850380 | Issue Tracking Third Party Advisory |
https://github.com/maistra/istio-operator/pull/462 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1850380 | Issue Tracking Third Party Advisory |
https://github.com/maistra/istio-operator/pull/462 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1850380 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/maistra/istio-operator/pull/462 - Patch, Third Party Advisory |
Information
Published : 2020-09-16 18:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14306
Mitre link : CVE-2020-14306
CVE.ORG link : CVE-2020-14306
JSON object : View
Products Affected
istio-operator_project
- istio-operator
CWE
CWE-862
Missing Authorization