A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
References
Link | Resource |
---|---|
https://github.com/openshift/enhancements/pull/323 | Patch Third Party Advisory |
https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/staging/src/k8s.io/apiserver/pkg/server/filters/wrap.go#L39 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2020-06-12T22:09:39
Updated: 2020-06-12T22:09:39
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10752
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-12T23:15:10.367
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-10752
JSON object: View
Redhat Information
No data.