In the OpenShift web console in versions 3.11 and 4.x an attacker can craft a URL in which to inject arbitrary text into error pages. This could be used to convince a user that the injected text is legitimate. References: https://www.owasp.org/index.php/Content_Spoofing
As pointed out by spadgett, this issue also affects OpenShift 4.x: - https://github.com/spadgett/console/blob/d390194f13bab8175e42eaf5a077a220b538624f/frontend/public/components/error.tsx#L33-L44
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:2992 https://access.redhat.com/errata/RHSA-2020:2992
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-10715
Upstream fix: https://github.com/openshift/origin-web-console/pull/3173
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2020:4298 https://access.redhat.com/errata/RHSA-2020:4298