First published: Mon Apr 18 2022(Updated: )
In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openshift Container Platform | =3.11 | |
Redhat Openshift Container Platform | =4.6 | |
Redhat Openshift Container Platform | =4.7 | |
Redhat Openshift Container Platform | =4.8 | |
Redhat Openshift Container Platform | =4.9 | |
Redhat Openshift Container Platform | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1677 is a vulnerability in OpenShift Container Platform that allows a user to craft a payload that inserts a malformed entry into the cluster router's HAProxy configuration files.
The severity of CVE-2022-1677 is medium with a severity value of 6.3.
OpenShift Container Platform versions 3.11, 4.6, 4.7, 4.8, 4.9, and 4.10 are affected by CVE-2022-1677.
A user with permissions to create or modify Routes can exploit CVE-2022-1677 by crafting a payload that inserts a malformed entry into the cluster router's HAProxy configuration files.
Yes, a fix for CVE-2022-1677 is available. Please refer to the following references for more information: [link1], [link2]