CVE-2024-6535

A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*

History

25 Jul 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:4865 -
  • () https://access.redhat.com/errata/RHSA-2024:4871 -

19 Jul 2024, 15:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Redhat
Redhat service Interconnect
CWE CWE-1392 CWE-287
References () https://bugzilla.redhat.com/show_bug.cgi?id=2296024 - () https://bugzilla.redhat.com/show_bug.cgi?id=2296024 - Issue Tracking
References () https://access.redhat.com/security/cve/CVE-2024-6535 - () https://access.redhat.com/security/cve/CVE-2024-6535 - Vendor Advisory
CPE cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*

17 Jul 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-17 03:15

Updated : 2024-09-18 09:15


NVD link : CVE-2024-6535

Mitre link : CVE-2024-6535


JSON object : View

Products Affected

redhat

  • service_interconnect
CWE
CWE-287

Improper Authentication