An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.
Workaround:
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:10813 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:7922 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:8415 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:8991 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:9620 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:0014 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-6508 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2295777 | issue tracking |