A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764 | Issue Tracking Mitigation Third Party Advisory |
https://kiali.io/news/security-bulletins/kiali-security-001/ | Exploit Mitigation Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764 | Issue Tracking Mitigation Third Party Advisory |
https://kiali.io/news/security-bulletins/kiali-security-001/ | Exploit Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764 - Issue Tracking, Mitigation, Third Party Advisory | |
References | () https://kiali.io/news/security-bulletins/kiali-security-001/ - Exploit, Mitigation, Vendor Advisory |
Information
Published : 2020-03-26 13:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1764
Mitre link : CVE-2020-1764
CVE.ORG link : CVE-2020-1764
JSON object : View
Products Affected
redhat
- openshift_service_mesh
kiali
- kiali