First published: Sun Mar 31 2024(Updated: )
A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue ("iss") check during JSON web token (JWT) authentication.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat openshift container platform | =4.0 | |
Red Hat OpenShift Distributed Tracing | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5037 is classified as a medium severity vulnerability due to its ability to allow an attacker to bypass JWT authentication under certain conditions.
To fix CVE-2024-5037, update your OpenShift Container Platform and OpenShift Distributed Tracing to the latest versions provided by Red Hat.
CVE-2024-5037 affects Red Hat OpenShift Container Platform version 4.0 and Red Hat OpenShift Distributed Tracing version 2.0.
CVE-2024-5037 allows an attacker to forge tokens and bypass the issuer check during JWT authentication.
There are no specific workarounds for CVE-2024-5037; updating to the patched versions is recommended.