First published: Wed Nov 02 2022(Updated: )
A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauthenticated users making requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Advanced Cluster Management For Kubernetes | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3841.
The severity of CVE-2022-3841 is high with a CVSS score of 7.8.
Red Hat Advanced Cluster Management for Kubernetes (RHACM) version 2.0 is affected by CVE-2022-3841.
This vulnerability allows an attacker to perform Server-Side Request Forgery (SSRF) attacks through the console API endpoint of RHACM, potentially leading to unauthorized access or information disclosure.
Yes, the fix for CVE-2022-3841 is available. Please refer to the official Red Hat security advisory for more information on how to apply the patch.