First published: Tue Feb 23 2016(Updated: )
Red Hat OpenShift Enterprise 3.1 uses world-readable permissions on the /etc/origin/master/master-config.yaml configuration file, which allows local users to obtain Active Directory credentials by reading the file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2142 is considered a high severity vulnerability due to its potential to expose sensitive Active Directory credentials.
To fix CVE-2016-2142, change the permissions on the /etc/origin/master/master-config.yaml file to restrict access to authorized users only.
CVE-2016-2142 affects users of Red Hat OpenShift Enterprise version 3.1 that are configured to use Active Directory for authentication.
CVE-2016-2142 is a local security vulnerability that allows unauthorized local users to access sensitive information.
The consequences of CVE-2016-2142 include the risk of unauthorized access to Active Directory credentials, potentially leading to further compromise.