First published: Fri Jul 26 2024(Updated: )
A flaw was found in the Openshift console. Several endpoints in the application use the authHandler() and authHandlerWithUser() middleware functions. When the default authentication provider ("openShiftAuth") is set, these functions do not perform any authentication checks, relying instead on the targeted service to handle authentication and authorization. This issue leads to various degrees of data exposure due to a lack of proper credential verification.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Console |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7128 is considered a critical severity vulnerability due to its potential to bypass authentication in OpenShift Console.
To mitigate CVE-2024-7128, ensure that proper authentication checks are enforced on all endpoints by configuring alternative authentication providers.
CVE-2024-7128 affects the Red Hat OpenShift Console when the default authentication provider is set to 'openShiftAuth'.
The potential impacts of CVE-2024-7128 include unauthorized access to sensitive resources and the ability to perform actions without authentication.
Red Hat has likely released a patch for CVE-2024-7128, and users should apply updates provided through their support channels.