Rapid7 Vulnerability & Exploit Database

Red Hat OpenShift: CVE-2013-0196: OpenShift Enterprise and Online vulnerable to CSRF attack with REST API

Back to Search

Red Hat OpenShift: CVE-2013-0196: OpenShift Enterprise and Online vulnerable to CSRF attack with REST API

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
10/08/2019
Created
10/09/2019
Added
10/08/2019
Modified
01/13/2020

Description

A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.

Solution(s)

  • linuxrpm-upgrade-rubygem-openshift-origin-controller

References

  • linuxrpm-upgrade-rubygem-openshift-origin-controller

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;