Improper Input Validation Affecting atomic-openshift-template-service-broker package, versions <0:3.11.248-1.git.0.92ee8ac.el7


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-ATOMICOPENSHIFTTEMPLATESERVICEBROKER-5275799
  • published27 Mar 2023
  • disclosed27 Jul 2020

Introduced: 27 Jul 2020

CVE-2020-10715  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade RHEL:7 atomic-openshift-template-service-broker to version 0:3.11.248-1.git.0.92ee8ac.el7 or higher.
This issue was patched in RHSA-2020:2992.

NVD Description

Note: Versions mentioned in the description apply only to the upstream atomic-openshift-template-service-broker package and not the atomic-openshift-template-service-broker package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.

CVSS Scores

version 3.1