A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4865 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4871 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-6535 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2296024 | issue tracking |