Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Assisted-service: assisted-service: authenticated users can gain administrative access to openshift clusters via credential disclosure
Vulnerability Description
A vulnerability in the assisted-service REST API, an optional Assisted Installer (assisted-service) component in the Multicluster Engine (MCE), allows an authenticated user with minimal namespace-scoped privileges to obtain administrative credentials for arbitrary clusters provisioned through the hub. The credentials download endpoint (GET /v2/clusters/{cluster_id}/credentials, which returns the kubeadmin password) and the kubeconfig download endpoint are operational in AUTH_TYPE=local mode, the only authentication mode available in on-premises ACM/MCE hub deployments. The local authenticator unconditionally grants full administrative access to any request bearing a valid JWT, with no per-endpoint restrictions. A valid local JWT is embedded as a plaintext query parameter in InfraEnvStatus.ISODownloadURL and is readable by any user who has get rights on an InfraEnv object in their own namespace. The affected components ship as part of Multicluster Engine (MCE). The Red Hat Advanced Cluster Management (ACM) deployments that include MCE are equally affected. This issue does not affect the hosted SaaS offering (console.redhat.com), which uses a different authentication mode. Successful exploitation gives the attacker the kubeadmin password and kubeconfig for any OpenShift cluster provisioned through the affected hub, granting unrestricted root-level administrative access to those spoke clusters.
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
敏感数据的明文存储
Vulnerability Title
Red Hat assisted-service 安全漏洞
Vulnerability Description
Red Hat assisted-service是美国红帽(Red Hat)公司的一个提供 REST API 的后端服务组件,主要服务于OpenShift生态系统。 Red Hat assisted-service存在安全漏洞,该漏洞源于assisted-service REST API组件在AUTH_TYPE=local模式下无条件授予JWT持有者完全管理权限,可能导致经过身份验证的用户获取通过中心配置的任意集群的管理员凭据。
CVSS Information
N/A
Vulnerability Type
N/A