Vulnerability Description
A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift | 1.2 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2013-0196Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196ExploitIssue TrackingThird Party Advisory
- https://access.redhat.com/security/cve/cve-2013-0196Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0196ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2013-0196?
CVE-2013-0196 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the c...
How severe is CVE-2013-0196?
CVE-2013-0196 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0196?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift, Redhat Enterprise Linux.