Vulnerability Description
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Service Interconnect | 1.0 |
| Redhat | Enterprise Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2023:6219Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-5056Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2239517Issue Tracking
- https://access.redhat.com/errata/RHSA-2023:6219Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-5056Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2239517Issue Tracking
FAQ
What is CVE-2023-5056?
CVE-2023-5056 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in...
How severe is CVE-2023-5056?
CVE-2023-5056 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5056?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Service Interconnect, Redhat Enterprise Linux.