CVE Vulnerabilities

CVE-2019-10214

Insufficiently Protected Credentials

Published: Nov 25, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.4 MODERATE
CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
BuildahBuildah_project- (including)- (including)
LibpodLibpod_project- (including)- (including)
Openshift_container_platformRedhat4.1 (including)4.1 (including)
SkopeoSkopeo_project- (including)- (including)
Enterprise_linuxRedhat8.0 (including)8.0 (including)
Red Hat Enterprise Linux 8RedHatcontainer-tools:rhel8-8010020190927090915.4985cc55*
Red Hat Enterprise Linux 8RedHatcontainer-tools:1.0-8010020190927091243.4985cc55*
Red Hat OpenShift Container Platform 3.10RedHatatomic-openshift-0:3.10.175-1.git.0.f9f0e81.el7*
Red Hat OpenShift Container Platform 3.10RedHatcri-o-0:1.10.6-2.rhaos3.10.git56d7d9a.el7*
Red Hat OpenShift Container Platform 3.11RedHatcri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7*
Red Hat OpenShift Container Platform 3.9RedHatcri-o-0:1.9.16-5.git858756d.el7*
Red Hat OpenShift Container Platform 4.1RedHatcri-o-0:1.13.11-0.7.dev.rhaos4.1.git9cb8f2f.el8*
Red Hat OpenShift Container Platform 4.1RedHatopenshift4/ose-docker-builder:v4.1.20-201910102034*
Golang-github-containers-imageUbuntufocal*
Golang-github-containers-imageUbuntugroovy*
Golang-github-containers-imageUbuntuhirsute*
Golang-github-containers-imageUbuntuimpish*
Golang-github-containers-imageUbuntukinetic*
Golang-github-containers-imageUbuntulunar*
Golang-github-containers-imageUbuntumantic*
Golang-github-containers-imageUbuntuoracular*
Golang-github-containers-imageUbuntuplucky*
Golang-github-containers-imageUbuntutrusty*
Singularity-containerUbuntubionic*
Singularity-containerUbuntutrusty*
Singularity-containerUbuntuupstream*

Potential Mitigations

References