A flaw was found in cluster-ingress-operator. A change to how the router-default service allows only certain IP source ranges could allow an attacker to access resources that would otherwise be restricted to specified IP ranges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability..
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2020-27836 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1905490 | Issue Tracking Permissions Required Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1906267 | Issue Tracking Patch Vendor Advisory |
https://github.com/openshift/cluster-ingress-operator/pull/507/commits/92c83f281ba5fb6a1d91ecc3beaa4bcf2647a729 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-08-22 15:15
Updated : 2024-02-28 19:29
NVD link : CVE-2020-27836
Mitre link : CVE-2020-27836
CVE.ORG link : CVE-2020-27836
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource