Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 2013-10-28 |
Product | Openshift | Last view | 2022-08-24 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:redhat:openshift:2.0:*:enterprise:*:*:*:*:* | 47 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.1 | 2022-08-24 | CVE-2021-4125 | It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6. |
5.5 | 2022-06-30 | CVE-2014-0068 | It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission. |
4.6 | 2021-07-30 | CVE-2021-3636 | It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service. |
7 | 2021-06-02 | CVE-2020-35514 | An insecure modification flaw in the /etc/kubernetes/kubeconfig file was found in OpenShift. This flaw allows an attacker with access to a running container which mounts /etc/kubernetes or has local access to the node, to copy this kubeconfig file and attempt to add their own node to the OpenShift cluster. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects versions before openshift4/ose-machine-config-operator v4.7.0-202105111858.p0. |
6.1 | 2021-05-27 | CVE-2020-1761 | A flaw was found in the OpenShift web console, where the access token is stored in the browser's local storage. An attacker can use this flaw to get the access token via physical access, or an XSS attack on the victim's browser. This flaw affects openshift/console versions before openshift/console-4. |
4.3 | 2020-09-16 | CVE-2020-10715 | A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate. |
7 | 2020-04-02 | CVE-2019-19348 | An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/apb-base, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. |
7 | 2020-04-02 | CVE-2019-19346 | An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/mariadb-apb, affecting versions before the following 4.3.5, 4.2.21, 4.1.37, and 3.11.188-4 . An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. |
7.8 | 2020-03-20 | CVE-2020-1709 | A vulnerability was found in all openshift/mediawiki 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the openshift/mediawiki. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. |
7 | 2020-03-20 | CVE-2020-1707 | A vulnerability was found in all openshift/postgresql-apb 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the container openshift/postgresql-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. |
7.8 | 2020-03-20 | CVE-2019-19345 | A vulnerability was found in all openshift/mediawiki-apb 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the container openshift/mediawiki-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. |
9.8 | 2020-02-12 | CVE-2014-0234 | The default configuration of broker.conf in Red Hat OpenShift Enterprise 2.x before 2.1 has a password of "mooo" for a Mongo account, which allows remote attackers to hijack the broker by providing this password, related to the openshift.sh script in Openshift Extras before 20130920. NOTE: this may overlap CVE-2013-4253 and CVE-2013-4281. |
5.3 | 2019-10-08 | CVE-2019-14845 | A vulnerability was found in OpenShift builds, versions 4.1 up to 4.3. Builds that extract source from a container image, bypass the TLS hostname verification. An attacker can take advantage of this flaw by launching a man-in-the-middle attack and injecting malicious content. |
7.5 | 2018-07-05 | CVE-2018-10885 | In atomic-openshift before version 3.10.9 a malicious network-policy configuration can cause Openshift Routing to crash when using ovs-networkpolicy plugin. An attacker can use this flaw to cause a Denial of Service (DoS) attack on an Openshift 3.9, or 3.7 Cluster. |
8.8 | 2016-08-07 | CVE-2016-5766 | Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image. |
8.8 | 2016-02-03 | CVE-2015-7538 | Jenkins before 1.640 and LTS before 1.625.2 allow remote attackers to bypass the CSRF protection mechanism via unspecified vectors. |
8.8 | 2016-02-03 | CVE-2015-7537 | Cross-site request forgery (CSRF) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via vectors related to the HTTP GET method. |
4.3 | 2015-11-25 | CVE-2015-5326 | Cross-site scripting (XSS) vulnerability in the slave overview page in Jenkins before 1.638 and LTS before 1.625.2 allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the slave offline status message. |
7.5 | 2015-11-25 | CVE-2015-5325 | Jenkins before 1.638 and LTS before 1.625.2 allow attackers to bypass intended slave-to-master access restrictions by leveraging a JNLP slave. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3665. |
5 | 2015-11-25 | CVE-2015-5324 | Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api. |
6.5 | 2015-11-25 | CVE-2015-5323 | Jenkins before 1.638 and LTS before 1.625.2 do not properly restrict access to API tokens which might allow remote administrators to gain privileges and run scripts by using an API token of another user. |
5 | 2015-11-25 | CVE-2015-5322 | Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/. |
5 | 2015-11-25 | CVE-2015-5321 | The sidepanel widgets in the CLI command overview and help pages in Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to the pages. |
5 | 2015-11-25 | CVE-2015-5320 | Jenkins before 1.638 and LTS before 1.625.2 do not properly verify the shared secret used in JNLP slave connections, which allows remote attackers to connect as slaves and obtain sensitive information or possibly gain administrative access by leveraging knowledge of the name of a slave. |
5 | 2015-11-25 | CVE-2015-5319 | XML external entity (XXE) vulnerability in the create-job CLI command in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to read arbitrary files via a crafted job configuration that is then used in an "XML-aware tool," as demonstrated by get-job and update-job. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
18% (8) | CWE-264 | Permissions, Privileges, and Access Controls |
13% (6) | CWE-200 | Information Exposure |
11% (5) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
9% (4) | CWE-20 | Improper Input Validation |
6% (3) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
6% (3) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (2) | CWE-352 | Cross-Site Request Forgery (CSRF) |
4% (2) | CWE-287 | Improper Authentication |
4% (2) | CWE-269 | Improper Privilege Management |
4% (2) | CWE-266 | Incorrect Privilege Assignment |
2% (1) | CWE-502 | Deserialization of Untrusted Data |
2% (1) | CWE-494 | Download of Code Without Integrity Check |
2% (1) | CWE-399 | Resource Management Errors |
2% (1) | CWE-284 | Access Control (Authorization) Issues |
2% (1) | CWE-190 | Integer Overflow or Wraparound |
2% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:20856 | DSA-2827-1 libcommons-fileupload-java - arbitrary file upload via deserializa... |
oval:org.mitre.oval:def:19947 | USN-2029-1 -- libcommons-fileupload-java vulnerability |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0154 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0061081 |
2015-B-0007 | Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity: Category I - VMSKEY: V0058213 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-09-19 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2522-1.nasl - Type: ACT_GATHER_INFO |
2017-09-06 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-1010.nasl - Type: ACT_GATHER_INFO |
2017-09-05 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-994.nasl - Type: ACT_GATHER_INFO |
2017-05-12 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL43267483.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2016-1063.nasl - Type: ACT_GATHER_INFO |
2016-12-15 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20161103_php_on_SL7_x.nasl - Type: ACT_GATHER_INFO |
2016-12-05 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201612-09.nasl - Type: ACT_GATHER_INFO |
2016-11-28 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2016-2598.nasl - Type: ACT_GATHER_INFO |
2016-11-11 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2016-2598.nasl - Type: ACT_GATHER_INFO |
2016-11-04 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2016-2598.nasl - Type: ACT_GATHER_INFO |
2016-09-02 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2016-2013-1.nasl - Type: ACT_GATHER_INFO |
2016-09-02 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2016-2080-1.nasl - Type: ACT_GATHER_INFO |
2016-08-05 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_556d22865a5111e6a6c314dae9d210b8.nasl - Type: ACT_GATHER_INFO |
2016-08-04 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-921.nasl - Type: ACT_GATHER_INFO |
2016-08-02 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2016-728.nasl - Type: ACT_GATHER_INFO |
2016-07-25 | Name: The remote Fedora host is missing a security update. File: fedora_2016-615f3bf06e.nasl - Type: ACT_GATHER_INFO |
2016-07-19 | Name: The remote Fedora host is missing a security update. File: fedora_2016-d126bb1b74.nasl - Type: ACT_GATHER_INFO |
2016-07-18 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3619.nasl - Type: ACT_GATHER_INFO |
2016-07-15 | Name: The remote Fedora host is missing a security update. File: fedora_2016-ec372bddb9.nasl - Type: ACT_GATHER_INFO |
2016-07-15 | Name: The remote Fedora host is missing a security update. File: fedora_2016-a4d48d6fd6.nasl - Type: ACT_GATHER_INFO |
2016-07-15 | Name: The remote Fedora host is missing a security update. File: fedora_2016-99fbdc5c34.nasl - Type: ACT_GATHER_INFO |
2016-07-15 | Name: The remote Fedora host is missing a security update. File: fedora_2016-34a6b65583.nasl - Type: ACT_GATHER_INFO |
2016-07-12 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3030-1.nasl - Type: ACT_GATHER_INFO |
2016-07-01 | Name: The version of PHP running on the remote web server is affected by multiple v... File: php_7_0_8.nasl - Type: ACT_GATHER_INFO |
2016-07-01 | Name: The version of PHP running on the remote web server is affected by multiple v... File: php_5_6_23.nasl - Type: ACT_GATHER_INFO |