First published: Tue Aug 16 2022(Updated: )
It was found that a malicious user could reroute internal calls to some internal services that were being accessed by the FQDN in a format of <service>.<namespace>.svc References - <a href="https://cwe.mitre.org/data/definitions/923.html">https://cwe.mitre.org/data/definitions/923.html</a> - <a href="https://docs.openshift.com/container-platform/4.10/architecture/admission-plug-ins.html#admission-plug-ins-default_admission-plug-ins">https://docs.openshift.com/container-platform/4.10/architecture/admission-plug-ins.html#admission-plug-ins-default_admission-plug-ins</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2118542 is high due to the potential for malicious internal call rerouting.
To fix REDHAT-BUG-2118542, update to the latest version of Red Hat OpenShift where the vulnerability is patched.
REDHAT-BUG-2118542 affects users of Red Hat OpenShift who utilize specific internal service call formats.
The impact of REDHAT-BUG-2118542 allows a malicious user to redirect internal service calls, potentially causing security breaches.
Currently, no specific workaround is recommended for REDHAT-BUG-2118542 aside from applying the security updates provided by Red Hat.