CVE-2016-3703 — Improper Access Control in Redhat Openshift
Severity
5.3MEDIUMNVD
EPSS
0.1%
top 65.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateMay 17
Description
Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.6 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
3: Untrusted content loaded via the API proxy can access web console credentials on the same domain↗2016-05-19
💬Community
1Bugzilla▶
CVE-2016-3703 OpenShift Enterprise 3: Untrusted content loaded via the API proxy can access web console credentials on the same domain↗2016-04-25