5.3
CVE-2024-6538
- EPSS 0.21%
- Published 25.11.2024 07:15:06
- Last modified 13.06.2025 06:15:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShift Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/openshift/console
≫
Package
openshift-console
Default Statusunaffected
Version <
6.0.6
Version
6.0.0
Status
affected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.16
Default Statusaffected
Version <
*
Version
v4.16.0-202506020836.p0.g94ae640.assembly.stream.el9
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version <
*
Version
v4.17.0-202505280435.p0.gf9c412e.assembly.stream.el9
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.18
Default Statusaffected
Version <
*
Version
v4.18.0-202505150334.p0.g75bc164.assembly.stream.el9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.44 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.