{
  "threat_severity" : "Low",
  "public_date" : "2020-07-27T00:00:00Z",
  "bugzilla" : {
    "description" : "openshift/console: text injection on error page via crafted url",
    "id" : "1767665",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1767665"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.1",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.", "A content spoofing vulnerability was found in the openshift/console. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "release_date" : "2020-07-27T00:00:00Z",
    "advisory" : "RHSA-2020:2992",
    "cpe" : "cpe:/a:redhat:openshift:3.11::el7",
    "package" : "atomic-openshift-web-console-0:3.11.248-1.git.1.cc96c2d.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.6",
    "release_date" : "2020-10-27T00:00:00Z",
    "advisory" : "RHSA-2020:4298",
    "cpe" : "cpe:/a:redhat:openshift:4.6::el8",
    "package" : "openshift4/ose-console:v4.6.0-202010100121.p0"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-10715\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-10715" ],
  "name" : "CVE-2020-10715",
  "csaw" : false
}