The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Authorization Bypass | 15 Jan 201909:22 | – | veracode |
![]() | CVE-2017-15137 | 16 Jul 201820:00 | – | cvelist |
![]() | Design/Logic Flaw | 16 Jul 201820:29 | – | prion |
![]() | CVE-2017-15137 | 11 Apr 201818:49 | – | redhatcve |
![]() | CVE-2017-15137 | 16 Jul 201820:29 | – | osv |
![]() | RHBA-2018:0489 Red Hat Bug Fix Advisory: Red Hat OpenShift Container Platform 3.9 RPM Release Advisory | 16 Sep 202400:55 | – | osv |
![]() | CVE-2017-15137 | 16 Jul 201820:29 | – | nvd |
[
{
"product": "atomic-openshift",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
]
Source | Link |
---|---|
access | www.access.redhat.com/errata/RHBA-2018:0489 |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo