First published: Mon Apr 27 2020(Updated: )
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kiali Kiali | >=0.4.0<1.15.1 | |
Redhat Openshift Service Mesh | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1762 is an insufficient JWT validation vulnerability found in Kiali versions 0.4.0 to 1.15.0.
The severity of CVE-2020-1762 is high with a CVSS score of 8.6.
An attacker can exploit CVE-2020-1762 by stealing a valid JWT cookie and using it to spoof a user session, potentially gaining unauthorized privileges.
Kiali versions 0.4.0 to 1.15.0, as well as Redhat Openshift Service Mesh 1.0, are affected by CVE-2020-1762.
CVE-2020-1762 can be fixed by updating Kiali to version 1.15.1 or applying the necessary patches provided by the vendor.