Bug 1693499 (CVE-2019-3889)
Summary: | CVE-2019-3889 atomic-openshift: reflected XSS in authentication flow | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jason Shepherd <jshepherd> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ahardin, bleanhar, bmontgom, ccoleman, dedgar, dominik.mierzejewski, eparis, jburrell, jgoulding, jokerman, mchappel, nstielau, rkshirsa, security-response-team, sponnaga, syang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | impact=moderate,public=20190708,reported=20190319,source=customer,cvss3=4.6/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L,cwe=CWE-79,openshift-enterprise-3.11/atomic-openshift=affected,openshift-enterprise-3.10/atomic-openshift=affected,openshift-enterprise-3.9/atomic-openshift=affected,openshift-enterprise-3.7/atomic-openshift=affected,openshift-enterprise-3.6/atomic-openshift=affected,openshift-enterprise-3.5/atomic-openshift=affected,openshift-enterprise-3.4/atomic-openshift=affected,openshift-online-3/atomic-openshift=defer,openshift-enterprise-4.1/ose-integrated-oauth-server-container=affected,openshift-4.2/oauth-server-container=affected,openshift-4.3/oauth-server-container=affected | ||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A reflected XSS vulnerability exists in the authentication flow of the OpenShift Container Platform. An attacker could use this flaw to steal authentication data by having users click a malicious link.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-11-07 06:51:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1694935, 1695419, 1695420, 1695421, 1695422, 1695423, 1695424, 1757044, 1757046, 1757422 | ||
Bug Blocks: | 1693494 |
Description
Jason Shepherd
2019-03-28 01:43:02 UTC
Acknowledgments: Name: Jeremy Choi (Red Hat) Statement: Since the HTTP Response "Content Type" is "text/plain" most browsers won't execute any Javascipt in the response content. However if an attacker can trick a user into loading the response in an iFrame it is possible to exploit this vulnerability. Appropriate Cross Origin Resource (CORS) Allowed Domain configuration in OCP 3 should prevent an attacker from getting any response from a attacker hosted domain. Therefore make sure that corsAllowedDomains is specified correctly in your OCP 3 master-config.yaml. See [1] for more details on an issue with corsAllowedDomains in OCP 3. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1694913 Also content sniffing browsers [2] do execute Javascript even when the "Content Type" HTTP Response header is set to "text/plain". [2] https://en.wikipedia.org/wiki/Content_sniffing This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:3722 https://access.redhat.com/errata/RHSA-2019:3722 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-3889 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.2 Via RHSA-2019:3770 https://access.redhat.com/errata/RHSA-2019:3770 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:0795 https://access.redhat.com/errata/RHSA-2020:0795 |