First published: Fri Jul 05 2024(Updated: )
A flaw was found in the OpenShift Console, an endpoint for plugins to serve resources in multiple languages: /locales/resources.json. This endpoint's lng and ns parameters are used to construct a filepath in pkg/plugins/handlers unsafely.go#L112 Because of this unsafe filepath construction, an authenticated user can manipulate the path to retrieve any JSON files on the console's pod by using sequences of ../ and valid directory paths.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Console | ||
go/github.com/openshift/console | <=6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7631 is rated as a high-severity vulnerability due to its potential impact on OpenShift Console users.
To mitigate CVE-2024-7631, ensure you are using a patched version of Red Hat OpenShift Console above 6.0.6.
CVE-2024-7631 affects Red Hat OpenShift Console versions up to and including 6.0.6.
The vulnerability affects the OpenShift Console's handling of the /locales/resources.json endpoint.
Yes, CVE-2024-7631 can be exploited remotely if the OpenShift Console is exposed to the internet.