Authentication Bypass by Primary Weakness Affecting atomic-openshift package, versions <0:3.9.51-1.git.0.dc3a40b.el7


Severity

Recommended
0.0
critical
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
37.55% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-ATOMICOPENSHIFT-5254056
  • published27 Mar 2023
  • disclosed3 Dec 2018

Introduced: 3 Dec 2018

CVE-2018-1002105  (opens in a new tab)
CWE-305  (opens in a new tab)

How to fix?

Upgrade RHEL:7 atomic-openshift to version 0:3.9.51-1.git.0.dc3a40b.el7 or higher.
This issue was patched in RHSA-2018:2908.

NVD Description

Note: Versions mentioned in the description apply only to the upstream atomic-openshift package and not the atomic-openshift package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.