CVE-2023-0813
Published on: Not Yet Published
Last Modified on: 09/20/2023 08:26:00 PM UTC
Certain versions of Enterprise Linux from Redhat contain the following vulnerability:
A flaw was found in the Network Observability plugin for OpenShift console. Unless the Loki authToken configuration is set to FORWARD mode, authentication is no longer enforced, allowing any user who can connect to the OpenShift Console in an OpenShift cluster to retrieve flows without authentication.
- CVE-2023-0813 has been assigned by
seca[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Red Hat - NETWORK-OBSERVABILITY-1.1.0-RHEL-8 version not down converted
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
2169468 – (CVE-2023-0813) CVE-2023-0813 network-observability-console-plugin-container: setting Loki authToken configuration to DISABLE or HOST mode leads to authentication longer being enforced | bugzilla.redhat.com text/html |
![]() |
cve-details | access.redhat.com text/html |
![]() |
Red Hat | access.redhat.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
Application | Redhat | Network Observability | 1.0 | All | All | All |
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:network_observability:1.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE