First published: Mon Jul 26 2021(Updated: )
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift/assisted-installer | <1.0.25.1 | 1.0.25.1 |
redhat/openshift/assisted-installer | <2.0.0 | 2.0.0 |
Redhat Openshift Assisted Installer | <1.0.25.3 | |
Redhat Openshift Container Platform | =4.6 | |
Redhat Enterprise Linux | =8.0 |
https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4
https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3684 is a vulnerability found in OpenShift Assisted Installer that leaks image pull secrets as plaintext in installation logs.
CVE-2021-3684 affects OpenShift Assisted Installer by exposing image pull secrets in plaintext, which can be exploited by authenticated users to pull container images from the registry.
The severity of CVE-2021-3684 is medium with a severity value of 5.5.
To fix CVE-2021-3684, update OpenShift Assisted Installer to version 1.0.25.1 or higher.
More information about CVE-2021-3684 can be found in the references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1985962), [GitHub Commit 1](https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4), [GitHub Commit 2](https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a).