First published: Wed Nov 16 2022(Updated: )
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Red Hat Single Sign-On | <7.6.2 | 7.6.2 |
Red Hat Single Sign-On | =7.0 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Redhat Openshift Container Platform For Linuxone | =4.9 | |
Redhat Openshift Container Platform For Linuxone | =4.10 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-4039.
The severity of CVE-2022-4039 is critical with a CVSS score of 9.8.
Red Hat Single Sign-On for OpenShift container images with an unsecured management interface enabled is affected by CVE-2022-4039.
An attacker can exploit CVE-2022-4039 by using the unsecured management interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
Yes, a fix is available for CVE-2022-4039. It is recommended to update to Red Hat Single Sign-On version 7.6.2.