Incorrect default permissions in Red Hat OpenShift Container Platform - CVE-2019-19335

 

Incorrect default permissions in Red Hat OpenShift Container Platform - CVE-2019-19335

Published: February 13, 2020


Vulnerability identifier: #VU25335
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-19335
CWE-ID: CWE-276
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat OpenShift Container Platform

Detailed vulnerability description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application during installation of an OpenShift 4 cluster. The `openshift-install` command line tool creates an `auth` directory, with `kubeconfig` and `kubeadmin-password` files. Both files contain credentials used to authenticate to the OpenShift API server, and are incorrectly assigned word-readable permissions.


How to mitigate CVE-2019-19335

Install updates from vendor's website.

Sources