First published: Wed Nov 16 2022(Updated: )
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Single Sign-on | =7.0 | |
Redhat Openshift Container Platform | =4.9 | |
Redhat Openshift Container Platform | =4.10 | |
Redhat Openshift Container Platform For Ibm Z | =4.9 | |
Redhat Openshift Container Platform For Ibm Z | =4.10 | |
Redhat Openshift Container Platform For Linuxone | =4.9 | |
Redhat Openshift Container Platform For Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
redhat/Red Hat Single Sign-On | <7.6.2 | 7.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-4039.
The severity of CVE-2022-4039 is critical with a CVSS score of 9.8.
Red Hat Single Sign-On for OpenShift container images with an unsecured management interface enabled is affected by CVE-2022-4039.
An attacker can exploit CVE-2022-4039 by using the unsecured management interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
Yes, a fix is available for CVE-2022-4039. It is recommended to update to Red Hat Single Sign-On version 7.6.2.