6.3
CVE-2022-1677
- EPSS 0.23%
- Published 01.09.2022 21:15:09
- Last modified 21.11.2024 06:41:14
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Openshift Container Platform Version3.11
Redhat ≫ Openshift Container Platform Version4.6
Redhat ≫ Openshift Container Platform Version4.7
Redhat ≫ Openshift Container Platform Version4.8
Redhat ≫ Openshift Container Platform Version4.9
Redhat ≫ Openshift Container Platform Version4.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.23% | 0.456 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.