Vulnerability Description
OpenShift Container Platform before version 4.1.3 writes OAuth tokens in plaintext to the audit logs for the Kubernetes API server and OpenShift API server. A user with sufficient privileges could recover OAuth tokens from these audit logs and use them to access other resources.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift Container Platform | < 4.1.3 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10165Issue TrackingPatchVendor Advisory
- https://github.com/openshift/cluster-kube-apiserver-operator/pull/499/PatchThird Party Advisory
- https://github.com/openshift/cluster-openshift-apiserver-operator/pull/205PatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10165Issue TrackingPatchVendor Advisory
- https://github.com/openshift/cluster-kube-apiserver-operator/pull/499/PatchThird Party Advisory
- https://github.com/openshift/cluster-openshift-apiserver-operator/pull/205PatchThird Party Advisory
FAQ
What is CVE-2019-10165?
CVE-2019-10165 is a vulnerability with a CVSS score of 2.3 (LOW). OpenShift Container Platform before version 4.1.3 writes OAuth tokens in plaintext to the audit logs for the Kubernetes API server and OpenShift API server. A user with sufficient privileges could rec...
How severe is CVE-2019-10165?
CVE-2019-10165 has been rated LOW with a CVSS base score of 2.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10165?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift Container Platform.