Vulnerability Description
An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0 and before 1.24.7. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netlify | Kiali-Operator | < 1.24.7 |
| Redhat | Openshift Service Mesh | 1.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1947361Issue TrackingPatchThird Party Advisory
- https://kiali.io/news/security-bulletins/kiali-security-003/Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1947361Issue TrackingPatchThird Party Advisory
- https://kiali.io/news/security-bulletins/kiali-security-003/Vendor Advisory
FAQ
What is CVE-2021-3495?
CVE-2021-3495 is a vulnerability with a CVSS score of 8.8 (HIGH). An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0 and before 1.24.7. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kial...
How severe is CVE-2021-3495?
CVE-2021-3495 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3495?
Check the references section above for vendor advisories and patch information. Affected products include: Netlify Kiali-Operator, Redhat Openshift Service Mesh.