A flaw was found in cluster-ingress-operator. A change to how the router-default service allows only certain IP source ranges could allow an attacker to access resources that would otherwise be restricted to specified IP ranges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability..
References
Link | Resource |
---|---|
https://github.com/openshift/cluster-ingress-operator/pull/507/commits/92c83f281ba5fb6a1d91ecc3beaa4bcf2647a729 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1906267 | Issue Tracking Patch Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2020-27836 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1905490 | Issue Tracking Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-08-22 08:15
Updated : 2022-08-24 12:27
NVD link : CVE-2020-27836
Mitre link : CVE-2020-27836
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
redhat
- enterprise_linux
- openshift_container_platform