CVE-2019-10225 — Insufficiently Protected Credentials in RED HAT Atomic-openshift
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 64.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateMay 24
Description
A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4
Affected Packages2 packages
Also affects: Openshift Container Platform 3.11, 4.0
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
atomic-openshift: The basic-user RBAC role allow leaking of GlusterFS StorageClass restuserkey value↗2019-08-19
💬Community
1Bugzilla▶
CVE-2019-10225 atomic-openshift: The basic-user RBAC role allow leaking of GlusterFS StorageClass restuserkey value↗2019-08-19