First published: Mon Dec 30 2019(Updated: )
A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =1.2 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0196 is classified as a medium severity vulnerability due to its potential for unauthorized access to user credentials.
To fix CVE-2013-0196, it is recommended to update to a patched version of OpenShift Enterprise that implements CSRF protection mechanisms.
CVE-2013-0196 can allow an attacker to exploit the lack of CSRF protections to obtain user credentials when users interact with the REST API.
Yes, CVE-2013-0196 specifically affects OpenShift Enterprise version 1.2.
CVE-2013-0196 allows for Cross-Site Request Forgery (CSRF) attacks which could compromise user authentication and credential security.