4.8
CVSSv3

CVE-2017-12195

Published: 27/07/2018 Updated: 12/02/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.8 | Impact Score: 2.5 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

A flaw was found in all Openshift Enterprise versions using the openshift elasticsearch plugin. An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat openshift container platform 3.4

redhat openshift container platform 3.5

redhat openshift container platform 3.6

redhat openshift container platform 3.7

Vendor Advisories

Synopsis Moderate: Red Hat OpenShift Enterprise security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 34, Red Hat OpenShift Container Platform 35, and Red Hat OpenShift Container Platform 36Red Hat Pr ...
Synopsis Moderate: Red Hat OpenShift Container Platform 37 security, bug, and enhancement update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 37Red Hat Product Security has rated this update as having a security impact of Moderate A ...
An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices ...