icon

We found results for “

CVE-2021-20278

Good to know:

icon

Date: May 28, 2021

An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy "OpenID" is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID "implicit flow" is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.

Language: Go

Severity Score

Severity Score

Weakness Type (CWE)

Improper Authentication

CWE-287

Authentication Bypass by Spoofing

CWE-290

Top Fix

icon

Upgrade Version

Upgrade to version github.com/kiali/kiali - v1.31.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us