Page 2 of 7 results (0.008 seconds)

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 0

A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a cluster, they could use the private key to decode API requests that should be protected by TLS sessions, potentially obtaining information they would not otherwise be able to. These certificates are not used for service authentication, so no opportunity for impersonation or active MITM attacks were made possible. • https://bugzilla.redhat.com/show_bug.cgi?id=1892551 • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users. Se detectó un problema en la API ManagedClusterView, que podría permitir que sean divulgados secretos a usuarios sin los permisos correctos. Unas vistas creadas para un usuario administrador estarán disponibles durante un breve período de tiempo para los usuarios que solo tengan permiso de visualización. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25655 https://access.redhat.com/security/cve/CVE-2020-25655 https://bugzilla.redhat.com/show_bug.cgi?id=1888475 • CWE-863: Incorrect Authorization •