Vulnerability Description
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- https://github.com/openshift/enhancements/pull/323PatchThird Party Advisory
- https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/stagingThird Party Advisory
- https://github.com/openshift/enhancements/pull/323PatchThird Party Advisory
- https://github.com/openshift/origin/blob/master/vendor/k8s.io/kubernetes/stagingThird Party Advisory
FAQ
What is CVE-2020-10752?
CVE-2020-10752 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the...
How severe is CVE-2020-10752?
CVE-2020-10752 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10752?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift Container Platform.