{
  "threat_severity" : "Important",
  "public_date" : "2020-12-10T00:00:00Z",
  "bugzilla" : {
    "description" : "cluster-ingress-operator: changes to loadBalancerSourceRanges overwritten by operator",
    "id" : "1906267",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1906267"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-732",
  "details" : [ "A flaw was found in cluster-ingress-operator. A change to how the router-default service allows only certain IP source ranges could allow an attacker to access resources that would otherwise be restricted to specified IP ranges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability..", "A flaw was found in cluster-ingress-operator. A change to how the router-default service allows only certain IP source ranges could allow an attacker to access resources that would otherwise be restricted to specified IP ranges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.6",
    "release_date" : "2020-12-21T00:00:00Z",
    "advisory" : "RHSA-2020:5614",
    "cpe" : "cpe:/a:redhat:openshift:4.6::el8",
    "package" : "openshift4/ose-cluster-ingress-operator:v4.6.0-202012161211.p0"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-27836\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-27836" ],
  "name" : "CVE-2020-27836",
  "mitigation" : {
    "value" : "Move the allowed IP source ranges from the loadBalancerSourceRanges setting to \"service.beta.kubernetes.io/load-balancer-source-ranges\" annotation. For example: \noc -n openshift-ingress annotate svc/router-default service.beta.kubernetes.io/load-balancer-source-ranges=10.0.0.0/8,192.168.0.0/16",
    "lang" : "en:us"
  },
  "csaw" : false
}