QID 770115

QID 770115: Red Hat OpenShift Container Platform 4.5 Security Update (RHSA-2021-2431)

Red Hat openshift container platform is Red Hat's cloud computing kubernetes application platform solution designed for on-premise or private cloud deployments.

Security Fix(es):
  • jenkins-2-plugins/config-file-provider: does not configure its xml parser to prevent xml external entity (xxe) attacks. (
    Cve-2021-21642)
  • jetty: local temporary directory hijacking vulnerability (cve-2020-27216)
  • jetty: buffer not correctly recycled in gzip request inflation (cve-2020-27218)
  • jetty: request containing multiple accept headers with a large number of "quality" parameters may lead to dos (cve-2020-27223)
  • jenkins-2-plugins/config-file-provider: does not correctly perform permission checks in several http endpoints. (
    Cve-2021-21643)
  • jenkins-2-plugins/config-file-provider: does not require post requests for an http endpoint, resulting in a cross-site request forgery (csrf) vulnerability. (
    Cve-2021-21644)
  • jenkins-2-plugins/config-file-provider: does not perform permission checks in several http endpoints. (
    Cve-2021-21645)

Affected Products:

  • Red Hat openshift container platform 4.5 for rhel 8 x86_64
  • Red Hat openshift container platform 4.5 for rhel 7 x86_64
  • Red Hat openshift container platform for power 4.5 for rhel 8 ppc64le
  • Red Hat openshift container platform for power 4.5 for rhel 7 ppc64le
  • Red Hat openshift container platform for ibm z and linuxone 4.5 for rhel 8 s390x
  • Red Hat openshift container platform for ibm z and linuxone 4.5 for rhel 7 s390x



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:2431 to address this issue and obtain more information.

    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:2431 Red Hat Enterprise Linux CoreOS URL Logo access.redhat.com/errata/RHSA-2021:2431