René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

122 lines
4.0 KiB
JSON

{
"id": "CVE-2021-3636",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-07-30T20:15:07.687",
"lastModified": "2022-10-27T12:28:52.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 en OpenShift, anterior a versi\u00f3n 4.8, que el certificado generado para la CA de servicio en el cl\u00faster, inclu\u00eda incorrectamente certificados adicionales. La CA de servicio se monta autom\u00e1ticamente en todos los pods, permiti\u00e9ndoles conectarse de forma segura a los servicios confiables del cl\u00faster que presentan certificados firmados por la CA de servicio confiable. Una inclusi\u00f3n incorrecta de CAs adicionales en este certificado podr\u00eda permitir a un atacante que comprometiera cualquiera de las CAs adicionales hacerse pasar por un servicio confiable dentro del cl\u00faster"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.1,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8",
"matchCriteriaId": "204FB913-E9B7-448F-8557-4100BF2ADDA9"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978621",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}