A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764 Issue Tracking Mitigation Third Party Advisory
https://kiali.io/news/security-bulletins/kiali-security-001/ Exploit Mitigation Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2020-03-26T11:16:09

Updated: 2020-03-26T11:16:09

Reserved: 2019-11-27T00:00:00


Link: CVE-2020-1764

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2020-03-26T13:15:13.203

Modified: 2023-11-07T03:19:34.693


Link: CVE-2020-1764

JSON object: View

cve-icon Redhat Information

No data.