Bug 1693499 (CVE-2019-3889) - CVE-2019-3889 atomic-openshift: reflected XSS in authentication flow
Summary: CVE-2019-3889 atomic-openshift: reflected XSS in authentication flow
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-3889
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20190708,repor...
Depends On: 1694935 1695419 1695420 1695421 1695422 1695423 1695424 1757044 1757046 1757422
Blocks: 1693494
TreeView+ depends on / blocked
 
Reported: 2019-03-28 01:43 UTC by Jason Shepherd
Modified: 2023-09-07 19:52 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A reflected XSS vulnerability exists in the authentication flow of the OpenShift Container Platform. An attacker could use this flaw to steal authentication data by having users click a malicious link.
Clone Of:
Environment:
Last Closed: 2019-11-07 06:51:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:3722 0 None None None 2019-11-07 06:19:24 UTC
Red Hat Product Errata RHSA-2019:3770 0 None None None 2019-11-13 18:35:57 UTC
Red Hat Product Errata RHSA-2020:0795 0 None None None 2020-03-20 00:10:49 UTC

Description Jason Shepherd 2019-03-28 01:43:02 UTC
A reflected XSS vulnerability exists in authentication flow of OpenShift Container Platform. An attacker could use this flaw to steal authentication data by getting them to click on a malicious link.

Comment 1 Jason Shepherd 2019-04-02 05:49:53 UTC
Acknowledgments:

Name: Jeremy Choi (Red Hat)

Comment 4 Jason Shepherd 2019-04-03 05:23:29 UTC
Statement:

Since the HTTP Response "Content Type" is "text/plain" most browsers won't execute any Javascipt in the response content. However if an attacker can trick a user into loading the response in an iFrame it is possible to exploit this vulnerability. Appropriate Cross Origin Resource (CORS) Allowed Domain configuration in OCP 3 should prevent an attacker from getting any response from a attacker hosted domain. Therefore make sure that corsAllowedDomains is specified correctly in your OCP 3 master-config.yaml. See [1] for more details on an issue with corsAllowedDomains in OCP 3.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1694913

Also content sniffing browsers [2] do execute Javascript even when the "Content Type" HTTP Response header is set to "text/plain".

[2] https://en.wikipedia.org/wiki/Content_sniffing

Comment 10 errata-xmlrpc 2019-11-07 06:19:23 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.1

Via RHSA-2019:3722 https://access.redhat.com/errata/RHSA-2019:3722

Comment 11 Product Security DevOps Team 2019-11-07 06:51:10 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-3889

Comment 12 errata-xmlrpc 2019-11-13 18:35:56 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.2

Via RHSA-2019:3770 https://access.redhat.com/errata/RHSA-2019:3770

Comment 13 errata-xmlrpc 2020-03-20 00:10:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2020:0795 https://access.redhat.com/errata/RHSA-2020:0795


Note You need to log in before you can comment on or make changes to this bug.