A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2020-03-26T11:16:09

Updated: 2024-08-04T06:46:30.916Z

Reserved: 2019-11-27T00:00:00

Link: CVE-2020-1764

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-26T13:15:13.203

Modified: 2024-11-21T05:11:20.277

Link: CVE-2020-1764

cve-icon Redhat

Severity : Important

Publid Date: 2020-03-25T18:00:00Z

Links: CVE-2020-1764 - Bugzilla