SB2020121809 - Multiple vulnerabilitis in OpenShift Container Platform 



SB2020121809 - Multiple vulnerabilitis in OpenShift Container Platform

Published: December 18, 2020

Security Bulletin ID SB2020121809
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Open redirect (CVE-ID: CVE-2018-1002102)

The vulnerability allows a remote privileged user to gain access to sensitive information.

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-8559)

The vulnerability allows a remote privileged user to execute arbitrary code.

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.


Remediation

Install update from vendor's website.