A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
2020-03-26T13:15:13.203
2024-11-21T05:11:20.277
Modified
CVSSv3.1: 8.6 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | kiali | kiali | < 1.15.1 | Yes |
Application | redhat | openshift_service_mesh | 1.0 | Yes |