An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Dec 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.13::el8 cpe:/a:redhat:openshift:4.13::el9 |
|
References |
|
Thu, 21 Nov 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.14::el8 cpe:/a:redhat:openshift:4.14::el9 cpe:/a:redhat:openshift:4.15::el9 |
|
References |
|
Sat, 16 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.15::el8 |
Wed, 30 Oct 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.16::el9 | |
References |
|
Wed, 16 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.17::el9 | |
References |
|
Wed, 21 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 21 Aug 2024 06:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | openshift-console: OAuth2 insufficient state parameter entropy | Openshift-console: oauth2 insufficient state parameter entropy |
First Time appeared |
Redhat
Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 | |
Vendors & Products |
Redhat
Redhat openshift |
|
References |
|
Mon, 19 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions. | |
Title | openshift-console: OAuth2 insufficient state parameter entropy | |
Weaknesses | CWE-331 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-08-21T05:45:28.303Z
Updated: 2024-12-17T20:01:00.613Z
Reserved: 2024-07-04T11:10:33.464Z
Link: CVE-2024-6508
Vulnrichment
Updated: 2024-08-21T13:37:42.967Z
NVD
Status : Awaiting Analysis
Published: 2024-08-21T06:15:08.120
Modified: 2024-12-12T04:15:08.007
Link: CVE-2024-6508
Redhat