CVE-2016-5392Sensitive Information Exposure in Redhat Openshift

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 60.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 5

Description

The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages1 packages

🔴Vulnerability Details

1
CVEList
CVE-2016-5392: The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 32016-08-05

📋Vendor Advisories

1
Red Hat
Kubernetes: disclosure of information in multi tenant environments via watch-cache list2016-07-14

💬Community

1
Bugzilla
CVE-2016-5392 Kubernetes: disclosure of information in multi tenant environments via watch-cache list2016-07-13
CVE-2016-5392 — Sensitive Information Exposure | cvebase