CVE Vulnerabilities

CVE-2024-6508

Insufficient Entropy

Published: Aug 21, 2024 | Modified: Oct 30, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Ubuntu

An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.

Weakness

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Affected Software

Name Vendor Start Version End Version
Red Hat OpenShift Container Platform 4.15 RedHat openshift4/ose-console:v4.15.0-202411060036.p0.gd8360d4.assembly.stream.el8 *
Red Hat OpenShift Container Platform 4.16 RedHat openshift4/ose-console-rhel9:v4.16.0-202410231737.p0.gf0870c3.assembly.stream.el9 *
Red Hat OpenShift Container Platform 4.17 RedHat openshift4/ose-console-rhel9:v4.17.0-202410091535.p0.ge61f187.assembly.stream.el9 *

Potential Mitigations

References