CVE-2020-14306

An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1850380 Issue Tracking Third Party Advisory
https://github.com/maistra/istio-operator/pull/462 Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1850380 Issue Tracking Third Party Advisory
https://github.com/maistra/istio-operator/pull/462 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:istio-operator_project:istio-operator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1850380 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1850380 - Issue Tracking, Third Party Advisory
References () https://github.com/maistra/istio-operator/pull/462 - Patch, Third Party Advisory () https://github.com/maistra/istio-operator/pull/462 - Patch, Third Party Advisory

Information

Published : 2020-09-16 18:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-14306

Mitre link : CVE-2020-14306

CVE.ORG link : CVE-2020-14306


JSON object : View

Products Affected

istio-operator_project

  • istio-operator
CWE
CWE-862

Missing Authorization