๐Ÿ” CVE Alert

CVE-2024-6538

MEDIUM 5.3

Openshift-console: openshift console: server-side request forgery

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShift Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster.

CWE CWE-918
Published Nov 25, 2024
Last Updated Nov 7, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14397 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19058 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:7863 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:8280 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:8556 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-6538 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2296057