Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-6508

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-21 Aug, 2024 | 05:45
Updated At-11 Nov, 2025 | 15:29
Rejected At-
Credits

Openshift-console: oauth2 insufficient state parameter entropy

An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:21 Aug, 2024 | 05:45
Updated At:11 Nov, 2025 | 15:29
Rejected At:
▼CVE Numbering Authority (CNA)
Openshift-console: oauth2 insufficient state parameter entropy

An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.

Affected Products
Collection URL
https://github.com/openshift/console
Package Name
openshift-console
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.12
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console
CPEs
  • cpe:/a:redhat:openshift:4.12::el9
  • cpe:/a:redhat:openshift:4.12::el8
Default Status
affected
Versions
Unaffected
  • From v4.12.0-202412201659.p0.g8910d84.assembly.stream.el8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.13
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console
CPEs
  • cpe:/a:redhat:openshift:4.13::el8
  • cpe:/a:redhat:openshift:4.13::el9
Default Status
affected
Versions
Unaffected
  • From v4.13.0-202411300029.p0.g68accd9.assembly.stream.el8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.14
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console
CPEs
  • cpe:/a:redhat:openshift:4.14::el8
  • cpe:/a:redhat:openshift:4.14::el9
Default Status
affected
Versions
Unaffected
  • From v4.14.0-202411131205.p0.g839a801.assembly.stream.el8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.15
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console
CPEs
  • cpe:/a:redhat:openshift:4.15::el8
  • cpe:/a:redhat:openshift:4.15::el9
Default Status
affected
Versions
Unaffected
  • From v4.15.0-202411060036.p0.gd8360d4.assembly.stream.el8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.16
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console-rhel9
CPEs
  • cpe:/a:redhat:openshift:4.16::el9
Default Status
affected
Versions
Unaffected
  • From v4.16.0-202410231737.p0.gf0870c3.assembly.stream.el9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.17
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift4/ose-console-rhel9
CPEs
  • cpe:/a:redhat:openshift:4.17::el9
Default Status
affected
Versions
Unaffected
  • From v4.17.0-202410091535.p0.ge61f187.assembly.stream.el9 before * (rpm)
Problem Types
TypeCWE IDDescription
CWECWE-331Insufficient Entropy
Type: CWE
CWE ID: CWE-331
Description: Insufficient Entropy
Metrics
VersionBase scoreBase severityVector
3.18.0HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Metrics Other Info
Red Hat severity rating
value:
Important
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2024-06-17 00:00:00
Made public.2024-08-19 00:00:00
Event: Reported to Red Hat.
Date: 2024-06-17 00:00:00
Event: Made public.
Date: 2024-08-19 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:10813
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:7922
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:8415
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:8991
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:9620
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:0014
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-6508
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2295777
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10813
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:7922
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8415
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8991
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:9620
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:0014
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6508
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2295777
Resource:
issue-tracking
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:21 Aug, 2024 | 06:15
Updated At:09 Jan, 2025 | 09:15

An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.0HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-331Secondarysecalert@redhat.com
CWE ID: CWE-331
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2024:10813secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:7922secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:8415secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:8991secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:9620secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:0014secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-6508secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2295777secalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:10813
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:7922
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8415
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:8991
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:9620
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:0014
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6508
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2295777
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2025-0577
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-18 Feb, 2026 | 20:25
Updated-18 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glibc: vdso getrandom acceleration may return predictable randomness

An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8
CWE ID-CWE-331
Insufficient Entropy
Details not found