First published: Mon Mar 16 2020(Updated: )
A flaw was found in the OpenShift web console, where the access token is stored in the browser's local storage. An attacker can use this flaw to get the access token via physical access, or an XSS attack on the victim's browser. This flaw affects openshift/console versions before openshift/console-4.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift/console | <4 | 4 |
Red Hat OpenShift | <4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1761 has a medium severity rating due to the potential exposure of sensitive access tokens.
To fix CVE-2020-1761, upgrade to openshift/console version 4.0 or later that addresses the vulnerability.
CVE-2020-1761 can be exploited through physical access to the browser or via cross-site scripting (XSS) attacks.
CVE-2020-1761 affects all versions of openshift/console before 4.0.
The vulnerability in CVE-2020-1761 is located in the OpenShift web console, specifically involving insecure access token storage in local storage.