Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2021-33195 CVE-2021-33197 CVE-2021-33198 CVE-2021-34558 |
CWE-ID | CWE-79 CWE-862 CWE-399 CWE-295 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #4 is available. |
Vulnerable software Subscribe |
kubevirt (Red Hat package) Operating systems & Components / Operating system package or component OpenShift Virtualization Server applications / Virtualization software |
Vendor | Red Hat Inc. |
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU56022
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-33195
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of data passed from DNS lookups. A remote attacker can send a specially crafted DNS reqponse and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
kubevirt (Red Hat package): 4.8.3-251.el7 - 4.8.3-251.el8
OpenShift Virtualization: before 4.8.5
http://access.redhat.com/errata/RHSA-2022:1329
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU56023
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-33197
CWE-ID:
CWE-862 - Missing Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authorization process.
The vulnerability exists due to an error in some configurations of ReverseProxy (from net/http/httputil). A remote attacker can drop arbitrary headers and bypass authorization process.
MitigationInstall updates from vendor's website.
kubevirt (Red Hat package): 4.8.3-251.el7 - 4.8.3-251.el8
OpenShift Virtualization: before 4.8.5
http://access.redhat.com/errata/RHSA-2022:1329
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU56024
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-33198
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application when handling a large exponent to the math/big.Rat SetString or UnmarshalText method. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
kubevirt (Red Hat package): 4.8.3-251.el7 - 4.8.3-251.el8
OpenShift Virtualization: before 4.8.5
http://access.redhat.com/errata/RHSA-2022:1329
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU55665
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-34558
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper certificate verification in crypto/tls package in Go when processing X.509 certificates. The application does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
MitigationInstall updates from vendor's website.
kubevirt (Red Hat package): 4.8.3-251.el7 - 4.8.3-251.el8
OpenShift Virtualization: before 4.8.5
http://access.redhat.com/errata/RHSA-2022:1329
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?