CVE-2020-10752Insufficiently Protected Credentials in Openshift-apiserver

Severity
7.5HIGHNVD
EPSS
0.3%
top 46.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 24

Description

A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages1 packages

Also affects: Openshift Container Platform 3.11, 4.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3cmv-p7jw-h3fg: A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server pan2022-05-24
CVEList
CVE-2020-10752: A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server pan2020-06-12

📋Vendor Advisories

1
Red Hat
openshift/openshift-apiserver: oauthtokens leaked to logs on panic2020-06-10

💬Community

1
Bugzilla
CVE-2020-10752 openshift/openshift-apiserver: oauthtokens leaked to logs on panic2020-05-26
CVE-2020-10752 — Insufficiently Protected Credentials | cvebase