A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesnt sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openshift | Redhat | 4.2 (including) | 4.2 (including) |
Openshift_container_platform | Redhat | 3.11 (including) | 3.11 (including) |
Openshift_container_platform | Redhat | 4.0 (including) | 4.0 (including) |