First published: Wed Jun 08 2016(Updated: )
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =3.2 | |
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2016-3711 vulnerability has a medium severity rating due to its potential to expose internal IP addresses.
To fix CVE-2016-3711, update to a patched version of OpenShift that addresses this vulnerability.
CVE-2016-3711 affects Red Hat OpenShift Enterprise version 3.2 and OpenShift Origin without specific restriction on versions.
CVE-2016-3711 allows local users to access sensitive information, potentially leading to further exploitation of the environment.
CVE-2016-3711 is a local vulnerability that requires access to the environment to exploit.