First published: Fri Jul 05 2024(Updated: )
Path traversal is a vulnerability that allows an attacker to read arbitrary files and directories that are stored outside of the intended files to distribute. This might include sensitive files like secrets, configuration files as well as sensitive operating system files (like /etc/passwd). The OpenShift Console has an endpoint for plugins to serve resources in multiple languages: /locales/resources.json The lng and ns parameters for this endpoint are used to unsafely construct a filepath in pkg/plugins/handlers.go#L112 Because of this unsafe filepath construction, an authenticated user can manipulate the path to retrieve any JSON files on the console's pod by using sequences of ../ and valid directory paths. Impact: Because of the affected endpoint's logic, only files with the .json extension can be accessed, limiting greatly the impact of this vulnerability. No security-impactful JSON files could be identified on the console's pod.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Console |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2296053 is classified as a medium severity vulnerability due to its potential to expose sensitive files.
To fix REDHAT-BUG-2296053, ensure that proper input validation and restrictions are in place to prevent path traversal.
The vulnerability REDHAT-BUG-2296053 affects Red Hat OpenShift Console.
REDHAT-BUG-2296053 can potentially expose sensitive files such as configuration files and operating system files like /etc/passwd.
System administrators and security teams managing Red Hat OpenShift Console should be particularly concerned about REDHAT-BUG-2296053.