{
  "threat_severity" : "Important",
  "public_date" : "2024-08-19T00:00:00Z",
  "bugzilla" : {
    "description" : "openshift-console: OAuth2 insufficient state parameter entropy",
    "id" : "2295777",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2295777"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-331",
  "details" : [ "An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.", "An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions." ],
  "statement" : "This insufficient entropy vulnerability in the OpenShift Console's OAuth2 implementation is a important severity issue due to its potential to enable Cross-Site Request Forgery (CSRF) attacks, allowing unauthorized third-party access to user accounts. The inefficiency in generating the state parameter undermines the primary defense mechanism against CSRF attacks, facilitating session hijacking and unauthorized data access. This vulnerability compromises the integrity and confidentiality of user data, posing significant risks to the overall security posture of the application.",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.12",
    "release_date" : "2025-01-09T00:00:00Z",
    "advisory" : "RHSA-2025:0014",
    "cpe" : "cpe:/a:redhat:openshift:4.12::el8",
    "package" : "openshift4/ose-console:v4.12.0-202412201659.p0.g8910d84.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2024-12-12T00:00:00Z",
    "advisory" : "RHSA-2024:10813",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "openshift4/ose-console:v4.13.0-202411300029.p0.g68accd9.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.14",
    "release_date" : "2024-11-20T00:00:00Z",
    "advisory" : "RHSA-2024:9620",
    "cpe" : "cpe:/a:redhat:openshift:4.14::el8",
    "package" : "openshift4/ose-console:v4.14.0-202411131205.p0.g839a801.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.15",
    "release_date" : "2024-11-13T00:00:00Z",
    "advisory" : "RHSA-2024:8991",
    "cpe" : "cpe:/a:redhat:openshift:4.15::el8",
    "package" : "openshift4/ose-console:v4.15.0-202411060036.p0.gd8360d4.assembly.stream.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.16",
    "release_date" : "2024-10-30T00:00:00Z",
    "advisory" : "RHSA-2024:8415",
    "cpe" : "cpe:/a:redhat:openshift:4.16::el9",
    "package" : "openshift4/ose-console-rhel9:v4.16.0-202410231737.p0.gf0870c3.assembly.stream.el9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2024-10-16T00:00:00Z",
    "advisory" : "RHSA-2024:7922",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "openshift4/ose-console-rhel9:v4.17.0-202410091535.p0.ge61f187.assembly.stream.el9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-6508\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-6508" ],
  "name" : "CVE-2024-6508",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}