First published: Thu Oct 31 2019(Updated: )
A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift-web-console | <0:3.11.248-1.git.1.cc96c2d.el7 | 0:3.11.248-1.git.1.cc96c2d.el7 |
redhat/openshift/origin-web-console | <2 | 2 |
Red Hat OpenShift | >=4.0<=4.3.5 | |
Red Hat OpenShift | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10715 is classified as a medium severity vulnerability, primarily due to its content spoofing nature.
To resolve CVE-2020-10715, ensure you update to the patched versions of the affected OpenShift web console components.
CVE-2020-10715 affects OpenShift versions 3.11 and 4.x, specifically the atomic-openshift-web-console and openshift/origin-web-console packages.
Exploitation of CVE-2020-10715 allows attackers to inject misleading content into error pages, potentially deceiving users.
CVE-2020-10715 is a specific content spoofing vulnerability identified in certain versions of OpenShift, making it a unique issue rather than a common one.