CVE-2024-6508

An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.
Configurations

No configuration.

History

09 Jan 2025, 09:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0014 -

12 Dec 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:10813 -

21 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:8991 -
  • () https://access.redhat.com/errata/RHSA-2024:9620 -

30 Oct 2024, 11:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:8415 -

16 Oct 2024, 07:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:7922 -
Summary
  • (es) Se encontró una vulnerabilidad de entropía insuficiente en Openshift Console. En el tipo de código de autorización y el tipo de concesión implícita, el protocolo OAuth2 es vulnerable a un ataque de Cross-Site Request Forgery (CSRF) si el parámetro de estado se utiliza de manera ineficiente. Esta falla permite iniciar sesión en la cuenta de la aplicación actual de la víctima utilizando una cuenta de terceros sin ninguna restricción.

21 Aug 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-21 06:15

Updated : 2025-01-09 09:15


NVD link : CVE-2024-6508

Mitre link : CVE-2024-6508

CVE.ORG link : CVE-2024-6508


JSON object : View

Products Affected

No product.

CWE
CWE-331

Insufficient Entropy