A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764 | Issue Tracking Mitigation Third Party Advisory |
https://kiali.io/news/security-bulletins/kiali-security-001/ | Exploit Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2020-03-26T11:16:09
Updated: 2020-03-26T11:16:09
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1764
JSON object: View
NVD Information
Status : Modified
Published: 2020-03-26T13:15:13.203
Modified: 2023-11-07T03:19:34.693
Link: CVE-2020-1764
JSON object: View
Redhat Information
No data.