Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-0813", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "state": "PUBLISHED", "assignerShortName": "redhat", "dateReserved": "2023-02-13T16:49:21.409Z", "datePublished": "2023-09-15T20:17:41.914Z", "dateUpdated": "2024-09-25T13:35:54.194Z"}, "containers": {"cna": {"title": "Network-observability-console-plugin-container: setting loki authtoken configuration to disable or host mode leads to authentication longer being enforced", "metrics": [{"other": {"content": {"value": "Important", "namespace": "https://access.redhat.com/security/updates/classification/"}, "type": "Red Hat severity rating"}}, {"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS"}], "descriptions": [{"lang": "en", "value": "A flaw was found in the Network Observability plugin for OpenShift console. Unless the Loki authToken configuration is set to FORWARD mode, authentication is no longer enforced, allowing any user who can connect to the OpenShift Console in an OpenShift cluster to retrieve flows without authentication."}], "affected": [{"repo": "https://github.com/netobserv/network-observability-console-plugin", "versions": [{"status": "unaffected", "version": "3badecfc675f63d7f497c4d86c296a0b9ac267e7", "lessThan": "*", "versionType": "git"}], "packageName": "github.com/netobserv/network-observability-console-plugin", "collectionURL": "https://github.com/netobserv/network-observability-console-plugin"}, {"vendor": "Red Hat", "product": "NETWORK-OBSERVABILITY-1.1.0-RHEL-8", "collectionURL": "https://catalog.redhat.com/software/containers/", "packageName": "network-observability/network-observability-console-plugin-rhel8", "defaultStatus": "affected", "versions": [{"version": "v1.1.0-10", "lessThan": "*", "versionType": "rpm", "status": "unaffected"}], "cpes": ["cpe:/a:redhat:network_observ_optr:1.1.0::el8"]}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2023:0786", "name": "RHSA-2023:0786", "tags": ["vendor-advisory", "x_refsource_REDHAT"]}, {"url": "https://access.redhat.com/security/cve/CVE-2023-0813", "tags": ["vdb-entry", "x_refsource_REDHAT"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169468", "name": "RHBZ#2169468", "tags": ["issue-tracking", "x_refsource_REDHAT"]}], "datePublic": "2023-02-13T00:00:00+00:00", "problemTypes": [{"descriptions": [{"cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "CWE"}]}], "x_redhatCweChain": "CWE-287->CWE-285: Improper Authentication leads to Improper Authorization", "timeline": [{"lang": "en", "time": "2023-02-09T00:00:00+00:00", "value": "Reported to Red Hat."}, {"lang": "en", "time": "2023-02-13T00:00:00+00:00", "value": "Made public."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2024-07-15T00:27:54.327174Z"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T05:24:34.543Z"}, "title": "CVE Program Container", "references": [{"url": "https://access.redhat.com/errata/RHSA-2023:0786", "name": "RHSA-2023:0786", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://access.redhat.com/security/cve/CVE-2023-0813", "tags": ["vdb-entry", "x_refsource_REDHAT", "x_transferred"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169468", "name": "RHBZ#2169468", "tags": ["issue-tracking", "x_refsource_REDHAT", "x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-25T13:35:22.587617Z", "id": "CVE-2023-0813", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-25T13:35:54.194Z"}}]}}