A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2020-03-26T11:16:09
Updated: 2024-08-04T06:46:30.916Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2020-1764
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-03-26T13:15:13.203
Modified: 2024-11-21T05:11:20.277
Link: CVE-2020-1764
Redhat