VYPR
Medium severity5.3NVD Advisory· Published Jun 8, 2016· Updated May 6, 2026

CVE-2016-3703

CVE-2016-3703

Description

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

Affected products

2
  • Red Hat/Openshift2 versions
    cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*+ 1 more
    • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*
    • cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.