A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1743073 Issue Tracking Mitigation Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2021-03-19T20:01:33

Updated: 2021-03-19T20:01:33

Reserved: 2019-03-27T00:00:00


Link: CVE-2019-10225

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-03-19T21:15:11.807

Modified: 2021-03-26T17:42:47.347


Link: CVE-2019-10225

JSON object: View

cve-icon Redhat Information

No data.

CWE