A flaw was found in OpenShift Container Platform where OAuth tokens are not encrypted when the encryption of data at rest is enabled. This flaw allows an attacker with access to a backup to obtain OAuth tokens and then use them to log into the cluster as any user who logged into the cluster via the WebUI or via the command line in the last 24 hours. Once the backup is older than 24 hours the OAuth tokens are no longer valid.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 | Issue Tracking Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 | Issue Tracking Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:55
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.6
         v3 : 6.3  | 
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10706 - Issue Tracking, Vendor Advisory | 
Information
                Published : 2020-05-12 14:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10706
Mitre link : CVE-2020-10706
CVE.ORG link : CVE-2020-10706
JSON object : View
Products Affected
                redhat
- openshift_container_platform
 
CWE
                
                    
                        
                        CWE-312
                        
            Cleartext Storage of Sensitive Information
