cve/2022/CVE-2022-2403.md

19 lines
974 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2403)
![](https://img.shields.io/static/v1?label=Product&message=Openshift&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Openshift%204.9%20onwards%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-497&color=brighgreen)
### Description
A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/sfowl/configmap-cleaner