High severity8.0NVD Advisory· Published Aug 21, 2024· Updated Apr 15, 2026
CVE-2024-6508
CVE-2024-6508
Description
An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/openshift/consoleGo | <= 6.0.6 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-4crf-28c7-v4grghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-6508ghsaADVISORY
- access.redhat.com/errata/RHSA-2024:10813nvdWEB
- access.redhat.com/errata/RHSA-2024:7922nvdWEB
- access.redhat.com/errata/RHSA-2024:8415nvdWEB
- access.redhat.com/errata/RHSA-2024:8991nvdWEB
- access.redhat.com/errata/RHSA-2024:9620nvdWEB
- access.redhat.com/errata/RHSA-2025:0014nvdWEB
- access.redhat.com/security/cve/CVE-2024-6508nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
News mentions
0No linked articles in our index yet.