First published: Fri Oct 13 2017(Updated: )
A flaw was found in all Openshift Enterprise versions using the openshift elasticsearch plugin. An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform | =3.4 | |
Red Hat OpenShift Container Platform | =3.5 | |
Red Hat OpenShift Container Platform | =3.6 | |
Red Hat OpenShift Container Platform | =3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12195 is considered a critical vulnerability due to its potential for authentication bypass.
To fix CVE-2017-12195, update your OpenShift Container Platform to a patched version that addresses the vulnerability.
CVE-2017-12195 affects OpenShift Container Platform versions 3.4, 3.5, 3.6, and 3.7.
An attacker can exploit CVE-2017-12195 to access Elasticsearch without a token by leveraging knowledge of the authentication name.
Yes, CVE-2017-12195 poses a risk of unauthorized access to sensitive data stored in Elasticsearch.