First published: Fri Jul 05 2024(Updated: )
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/skupperproject/skupper | <0.0.0-20240703184342-c26bce4079ff | 0.0.0-20240703184342-c26bce4079ff |
Red Hat Service Interconnect | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6535 has been classified as a high severity vulnerability due to its potential to bypass authentication.
To fix CVE-2024-6535, update Skupper to version 0.0.0-20240703184342-c26bce4079ff or higher.
CVE-2024-6535 affects Skupper and Red Hat Service Interconnect version 1.0.
Yes, CVE-2024-6535 can allow an attacker to bypass authentication, potentially leading to unauthorized access.
CVE-2024-6535 was reported in 2024, although the exact date is not specified.