CVE-2016-3703Improper Access Control in Redhat Openshift

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 65.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateMay 17

Description

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.6 | Impact: 3.6

Affected Packages1 packages

NVDredhat/openshift3.1, 3.2+1

🔴Vulnerability Details

2
GHSA
GHSA-xhrq-h87x-w62q: Red Hat OpenShift Enterprise 32022-05-17
CVEList
CVE-2016-3703: Red Hat OpenShift Enterprise 32016-06-08

📋Vendor Advisories

1
Red Hat
3: Untrusted content loaded via the API proxy can access web console credentials on the same domain2016-05-19

💬Community

1
Bugzilla
CVE-2016-3703 OpenShift Enterprise 3: Untrusted content loaded via the API proxy can access web console credentials on the same domain2016-04-25
CVE-2016-3703 — Improper Access Control in Redhat | cvebase