Vulnerability Description
A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift | 4.2 |
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1743073Issue TrackingMitigationThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1743073Issue TrackingMitigationThird Party Advisory
FAQ
What is CVE-2019-10225?
CVE-2019-10225 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the rest...
How severe is CVE-2019-10225?
CVE-2019-10225 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10225?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift, Redhat Openshift Container Platform.