CVE-2016-5392

The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*

History

12 Feb 2023, 23:23

Type Values Removed Values Added
Summary The Kubernetes API server contains a watch cache that speeds up performance. Due to an input validation error OpenShift Enterprise may return data for other users and projects when queried by a user. An attacker with knowledge of other project names could use this vulnerability to view their information. The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list.
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2016-5392', 'name': 'https://access.redhat.com/security/cve/CVE-2016-5392', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 21:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2016-5392 -
Summary The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list. The Kubernetes API server contains a watch cache that speeds up performance. Due to an input validation error OpenShift Enterprise may return data for other users and projects when queried by a user. An attacker with knowledge of other project names could use this vulnerability to view their information.

Information

Published : 2016-08-05 15:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-5392

Mitre link : CVE-2016-5392

CVE.ORG link : CVE-2016-5392


JSON object : View

Products Affected

redhat

  • openshift
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor