A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2023:1047 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2022-4039 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2143416 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2023:1047 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2022-4039 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2143416 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-22 15:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4039
Mitre link : CVE-2022-4039
CVE.ORG link : CVE-2022-4039
JSON object : View
Products Affected
redhat
- enterprise_linux
- single_sign-on
- openshift_container_platform_for_linuxone
- openshift_container_platform
- openshift_container_platform_for_power
- openshift_container_platform_for_ibm_z
CWE
CWE-276
Incorrect Default Permissions