First published: Wed Jul 24 2024(Updated: )
A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7079 has been classified with a high severity rating due to its impact on the OpenShift console's Helm chart verification endpoint.
To mitigate CVE-2024-7079, it is recommended to update to the latest patched versions of Red Hat OpenShift Container Platform 3.11 and 4.0.
CVE-2024-7079 affects Red Hat OpenShift Container Platform versions 3.11 and 4.0.
Exploitation of CVE-2024-7079 may allow unauthorized access to the Helm chart verification process, potentially compromising the integrity of the deployment.
Currently, there are no documented workarounds for CVE-2024-7079; the recommended approach is to apply the security updates.