{
  "threat_severity" : "Important",
  "public_date" : "2024-06-05T17:51:00Z",
  "bugzilla" : {
    "description" : "openshift/telemeter: iss check during JWT authentication can be bypassed",
    "id" : "2272339",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2272339"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-290",
  "details" : [ "A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue (\"iss\") check during JSON web token (JWT) authentication.", "A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue (\"iss\") check during JSON web token (JWT) authentication." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.12",
    "release_date" : "2024-08-19T00:00:00Z",
    "advisory" : "RHSA-2024:5200",
    "cpe" : "cpe:/a:redhat:openshift:4.12::el8",
    "package" : "openshift4/ose-telemeter:v4.12.0-202408071159.p0.gc9592de.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2024-07-17T00:00:00Z",
    "advisory" : "RHSA-2024:4484",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "openshift4/ose-telemeter:v4.13.0-202407081338.p0.g0634a6d.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.14",
    "release_date" : "2024-07-11T00:00:00Z",
    "advisory" : "RHSA-2024:4329",
    "cpe" : "cpe:/a:redhat:openshift:4.14::el8",
    "package" : "openshift4/ose-telemeter:v4.14.0-202407021509.p0.g1f72681.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.15",
    "release_date" : "2024-07-02T00:00:00Z",
    "advisory" : "RHSA-2024:4151",
    "cpe" : "cpe:/a:redhat:openshift:4.15::el9",
    "package" : "openshift4/ose-telemeter-rhel9:v4.15.0-202406200537.p0.g14489f7.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.16",
    "release_date" : "2024-07-03T00:00:00Z",
    "advisory" : "RHSA-2024:4156",
    "cpe" : "cpe:/a:redhat:openshift:4.16::el9",
    "package" : "openshift4/ose-telemeter-rhel9:v4.16.0-202406200537.p0.gc1ecd10.assembly.stream.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Logging Subsystem for Red Hat OpenShift",
    "fix_state" : "Not affected",
    "package_name" : "openshift-logging/opa-openshift-rhel8",
    "cpe" : "cpe:/a:redhat:logging:5"
  }, {
    "product_name" : "Red Hat OpenShift distributed tracing 2",
    "fix_state" : "Affected",
    "package_name" : "rhosdt/tempo-gateway-opa-rhel8",
    "cpe" : "cpe:/a:redhat:openshift_distributed_tracing:2"
  }, {
    "product_name" : "Red Hat OpenShift distributed tracing 3",
    "fix_state" : "Affected",
    "package_name" : "rhosdt/tempo-gateway-opa-rhel8",
    "cpe" : "cpe:/a:redhat:openshift_distributed_tracing:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-5037\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-5037\nhttps://github.com/kubernetes/kubernetes/pull/123540\nhttps://github.com/openshift/telemeter/blob/a9417a6062c3a31ed78c06ea3a0613a52f2029b2/pkg/authorize/jwt/client_authorizer.go#L78" ],
  "name" : "CVE-2024-5037",
  "csaw" : false
}