OpenShift Logging LokiStack Token-Based Cache Overprivilege Vulnerability
CVE-2023-4456 Published on August 21, 2023
Openshift-logging: lokistack authorisation is cached too broadly
A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.
Vulnerability Analysis
CVE-2023-4456 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Products Associated with CVE-2023-4456
stack.watch emails you whenever new vulnerabilities are published in Red Hat Openshift Logging or Red Hat Logging. Just hit a watch button to start following.
Affected Versions
Red Hat RHOL-5.5-RHEL-8:- Version v0.1.0-327 and below * is unaffected.
- Version v0.1.0-326 and below * is unaffected.
- Version v0.1.0-325 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.