Authentication Bypass by Primary Weakness Affecting openshift package, versions *


Severity

Recommended
0.0
critical
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
34.58% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-OPENSHIFT-5354462
  • published27 Mar 2023
  • disclosed3 Dec 2018

Introduced: 3 Dec 2018

CVE-2018-1002105  (opens in a new tab)
CWE-305  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 openshift.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openshift package and not the openshift package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.