Vulnerability Name: | CVE-2020-10752 (CCN-184792) | ||||||||||||
Assigned: | 2020-05-13 | ||||||||||||
Published: | 2020-05-13 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-10752 Source: XF Type: UNKNOWN openshift-cve202010752-info-disc(184792) Source: CCN Type: OpenShift GIT Repository enhancement: Secure OAuth Resource Storage #323 Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/openshift/enhancements/pull/323 Source: CONFIRM Type: Third Party Advisory https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 Source: CCN Type: IBM Security Bulletin 6599703 (Db2 On Openshift) Multiple vulnerabilities affect IBM Db2 On Openshift and IBM Db2 and Db2 Warehouse on Cloud Pak for Data Source: CCN Type: IBM Security Bulletin 6833272 (CICS TX Standard) IBM CICS TX Standard is vulnerable to multiple vulnerabilities in Kubernetes. Source: CCN Type: IBM Security Bulletin 6833274 (CICS TX Advanced) IBM CICS TX Advanced is vulnerable to multiple vulnerabilities in Kubernetes. | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |