Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6538— Openshift-console: openshift console: server-side request forgery

CVSS 5.3 · Medium EPSS 0.17% · P38
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-6538

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Openshift-console: openshift console: server-side request forgery
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShift Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat OpenShift Console 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat OpenShift Console是美国红帽(Red Hat)公司的一个 OpenShift 控制台。 Red Hat OpenShift Console存在安全漏洞,该漏洞源于组件openshift4/ose-console容易受到服务端请求伪造攻击,允许认证用户通过/api/dev-console/proxy/internet端点让控制台执行任意HTTP(s)请求,可能泄露信息或对系统造成恶意影响。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat OpenShift Container Platform 4.16 v4.16.0-202506020836.p0.g94ae640.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.16::el9
Red HatRed Hat OpenShift Container Platform 4.17 v4.17.0-202505280435.p0.gf9c412e.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift Container Platform 4.18 v4.18.0-202505150334.p0.g75bc164.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.18::el9
Red HatRed Hat OpenShift Container Platform 4.14 sha256:5593067bbf79e50ab9ed89c684c8ee03b4b2a0b6443068459967df623c0643de ~ * cpe:/a:redhat:openshift:4.14::el9
Red HatRed Hat OpenShift Container Platform 4.15 sha256:8d6e2390929560bdddddf8caab133f14fa50dbd53a5e551f134680837778e180 ~ * cpe:/a:redhat:openshift:4.15::el9

II. Public POCs for CVE-2024-6538

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-6538

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-6538

No comments yet


Leave a comment