CVE-2021-20278Authentication Bypass by Spoofing in Kiali Kiali

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 62.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 28
Latest updateAug 21

Description

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages3 packages

NVDkiali/kiali< 1.31.0
CVEListV5kiali/kialikiali 1.31.0

Patches

🔴Vulnerability Details

4
OSV
Kiali Authentication Bypass vulnerability in github.com/kiali/kiali2024-08-21
GHSA
Kiali Authentication Bypass vulnerability2021-06-01
OSV
Kiali Authentication Bypass vulnerability2021-06-01
CVEList
CVE-2021-20278: An authentication bypass vulnerability was found in Kiali in versions before 12021-05-28

📋Vendor Advisories

1
Red Hat
kiali: authentication bypass when using the OpenID login strategy2021-03-05
CVE-2021-20278 — Authentication Bypass by Spoofing | cvebase