We found results for “”
CVE-2021-20278
Good to know:
Date: May 28, 2021
An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy "OpenID" is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID "implicit flow" is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.
Language: Go
Severity Score
Related Resources (6)
Severity Score
Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | MEDIUM |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


