Bug 1693499 (CVE-2019-3889)

Summary: CVE-2019-3889 atomic-openshift: reflected XSS in authentication flow
Product: [Other] Security Response Reporter: Jason Shepherd <jshepherd>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ahardin, bleanhar, bmontgom, ccoleman, dedgar, dominik.mierzejewski, eparis, jburrell, jgoulding, jokerman, mchappel, nstielau, rkshirsa, security-response-team, sponnaga, syang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20190708,reported=20190319,source=customer,cvss3=4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L,cwe=CWE-79,openshift-enterprise-3.11/atomic-openshift=affected,openshift-enterprise-3.10/atomic-openshift=affected,openshift-enterprise-3.9/atomic-openshift=affected,openshift-enterprise-3.7/atomic-openshift=affected,openshift-enterprise-3.6/atomic-openshift=affected,openshift-enterprise-3.5/atomic-openshift=affected,openshift-enterprise-3.4/atomic-openshift=affected,openshift-online-3/atomic-openshift=defer,openshift-enterprise-4.1/ose-integrated-oauth-server-container=affected,openshift-4.2/oauth-server-container=affected,openshift-4.3/oauth-server-container=affected
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A reflected XSS vulnerability exists in the authentication flow of the OpenShift Container Platform. An attacker could use this flaw to steal authentication data by having users click a malicious link.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-11-07 06:51:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1694935, 1695419, 1695420, 1695421, 1695422, 1695423, 1695424, 1757044, 1757046, 1757422    
Bug Blocks: 1693494    

Description Jason Shepherd 2019-03-28 01:43:02 UTC
A reflected XSS vulnerability exists in authentication flow of OpenShift Container Platform. An attacker could use this flaw to steal authentication data by getting them to click on a malicious link.

Comment 1 Jason Shepherd 2019-04-02 05:49:53 UTC
Acknowledgments:

Name: Jeremy Choi (Red Hat)

Comment 4 Jason Shepherd 2019-04-03 05:23:29 UTC
Statement:

Since the HTTP Response "Content Type" is "text/plain" most browsers won't execute any Javascipt in the response content. However if an attacker can trick a user into loading the response in an iFrame it is possible to exploit this vulnerability. Appropriate Cross Origin Resource (CORS) Allowed Domain configuration in OCP 3 should prevent an attacker from getting any response from a attacker hosted domain. Therefore make sure that corsAllowedDomains is specified correctly in your OCP 3 master-config.yaml. See [1] for more details on an issue with corsAllowedDomains in OCP 3.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1694913

Also content sniffing browsers [2] do execute Javascript even when the "Content Type" HTTP Response header is set to "text/plain".

[2] https://en.wikipedia.org/wiki/Content_sniffing

Comment 10 errata-xmlrpc 2019-11-07 06:19:23 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.1

Via RHSA-2019:3722 https://access.redhat.com/errata/RHSA-2019:3722

Comment 11 Product Security DevOps Team 2019-11-07 06:51:10 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-3889

Comment 12 errata-xmlrpc 2019-11-13 18:35:56 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.2

Via RHSA-2019:3770 https://access.redhat.com/errata/RHSA-2019:3770

Comment 13 errata-xmlrpc 2020-03-20 00:10:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2020:0795 https://access.redhat.com/errata/RHSA-2020:0795