A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
References
Configurations
History
25 Jul 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Jul 2024, 15:00
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| First Time |
Redhat
Redhat service Interconnect |
|
| CWE | CWE-287 | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2296024 - Issue Tracking | |
| References | () https://access.redhat.com/security/cve/CVE-2024-6535 - Vendor Advisory | |
| CPE | cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:* |
17 Jul 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-17 03:15
Updated : 2024-09-18 09:15
NVD link : CVE-2024-6535
Mitre link : CVE-2024-6535
JSON object : View
Products Affected
redhat
- service_interconnect
CWE
CWE-287
Improper Authentication
