OpenShift Container Platform 4 does not sanitize secret data written to static pod logs when the log level in a given operator is set to Debug or higher. A low privileged user could read pod logs to discover secret material if the log level has already been modified in an operator by a privileged user.
The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openshift_container_platform | Redhat | 4.1 (including) | 4.1 (including) |
Openshift_container_platform | Redhat | 4.2 (including) | 4.2 (including) |
Red Hat OpenShift Container Platform 4.1 | RedHat | openshift4/ose-cluster-kube-apiserver-operator:v4.1.26-201911260202 | * |
Red Hat OpenShift Container Platform 4.1 | RedHat | openshift4/ose-cluster-kube-controller-manager-operator:v4.1.27-201912030019 | * |
Red Hat OpenShift Container Platform 4.1 | RedHat | openshift4/ose-cluster-kube-scheduler-operator:v4.1.27-201912030019 | * |
Red Hat OpenShift Container Platform 4.2 | RedHat | openshift4/ose-cluster-kube-apiserver-operator:v4.2.9-201911261133 | * |
Red Hat OpenShift Container Platform 4.2 | RedHat | openshift4/ose-cluster-kube-scheduler-operator:v4.2.9-201911261133 | * |
Red Hat OpenShift Container Platform 4.2 | RedHat | openshift4/ose-cluster-kube-controller-manager-operator:v4.2.10-201912022352 | * |