Use of Hard-coded Credentials
CVE-2020-1764
Summary
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
- LOW
- NETWORK
- LOW
- UNCHANGED
- NONE
- NONE
- LOW
- HIGH
CWE-798 - Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
References
Advisory Timeline
- Published