First published: Fri Jun 12 2020(Updated: )
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10752 is classified as a moderate-severity vulnerability affecting OpenShift API Server.
To fix CVE-2020-10752, upgrade OpenShift Container Platform to a version that addresses this vulnerability.
CVE-2020-10752 affects OpenShift Container Platform versions 3.11 and 4.0.
Attackers can exploit CVE-2020-10752 by causing an API Server panic and then accessing the logs to retrieve leaked OAuthTokens.
The potential consequences of CVE-2020-10752 include unauthorized access to OpenShift environments due to leaked OAuthTokens.