| |
Vulnerability CVE-2021-20278
Published: 2021-05-28
Description: |
An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication. |
Type:
CWE-290 (Authentication Bypass by Spoofing)
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.8/10 |
4.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
https://bugzilla.redhat.com/show_bug.cgi?id=1937171
https://kiali.io/news/security-bulletins/kiali-security-002/
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|