Vulnerability Details : CVE-2022-1677
In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.
Products affected by CVE-2022-1677
- cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-1677
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-1677
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
NIST |
CWE ids for CVE-2022-1677
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: secalert@redhat.com (Primary)
References for CVE-2022-1677
-
https://bugzilla.redhat.com/show_bug.cgi?id=2076211
2076211 – (CVE-2022-1677) CVE-2022-1677 openshift/router: route hijacking attack via crafted HAProxy configuration fileIssue Tracking;Patch;Vendor Advisory
-
https://access.redhat.com/security/cve/CVE-2022-1677
CVE-2022-1677- Red Hat Customer PortalVendor Advisory
Jump to