Bug 1950275 (CVE-2020-25864)
Summary: | CVE-2020-25864 consul: specially crafted KV entry could be used to perform a XSS attack | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, alegrand, alitke, anpicker, aos-bugs, bbennett, bmontgom, chazlett, cnv-qe-bugs, drieden, eparis, erooth, fdeutsch, ggaughan, gghezzo, gmalinko, gparvin, janstey, jburrell, jhrozek, jochrist, jokerman, josorior, jramanat, jweiser, jwendell, jwon, kakkoyun, kconner, krizza, lcosic, mrogers, nstielau, pdhamdhe, pkrupa, rcernich, sbatsche, sejug, shardy, sponnaga, stcannon, stirabos, surbania, team-winc, thee, twalsh, xiyuan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | consul 1.10.0-beta1, consul 1.9.5, consul 1.8.10, consul 1.7.14 | Doc Type: | If docs needed, set a value |
Doc Text: |
In consul a specially crafted KV (key/value store) entry could be used by attacker to perform a XSS (Cross Site Scripting) attack when viewed in the raw mode.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-05-27 17:32:08 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1950276 |
Description
Marian Rehak
2021-04-16 09:43:49 UTC
I'm changing the flaw severity from Important to Moderate because this vulnerability doesn't classify for higher severity than Moderate. External References: https://github.com/hashicorp/consul/pull/10023 Successful exploit requires a specially crafted entry in KV Consul store (key/value store) and when viewed in RAW mode could be used to perform a XSS attack. This requires from potential attacker some knowledge about the environment. This should be considered as Moderate impact flaw. Statement: OpenShift Container Platform (OCP) and OpenShift Service Mesh (OSSM) components ship only consul api which could be used for connection to consul service mesh solution, therefore are not affected by this flaw. Some OpenShift Virtualization components reference consul in go.sum files, however none of the projects or container images depend on or ship consul, therefore are not affected by this flaw. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25864 |