Description
An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.
INFO
Published Date :
2024-08-21T05:45:28.303Z
Last Modified :
2026-02-25T20:31:31.040Z
Source :
redhat
AFFECTED PRODUCTS
The following products are affected by CVE-2024-6508 vulnerability.
| Vendors | Products |
|---|---|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-6508.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact