Vulnerability Description
In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-1677Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2076211Issue TrackingPatchVendor Advisory
- https://access.redhat.com/security/cve/CVE-2022-1677Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2076211Issue TrackingPatchVendor Advisory
FAQ
What is CVE-2022-1677?
CVE-2022-1677 is a vulnerability with a CVSS score of 6.3 (MEDIUM). In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. Thi...
How severe is CVE-2022-1677?
CVE-2022-1677 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1677?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift Container Platform.