{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4039","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2022-11-16T21:32:53.153Z","datePublished":"2023-09-22T14:00:39.803Z","dateUpdated":"2024-09-24T14:29:55.579Z"},"containers":{"cna":{"title":"Rhsso-container-image: unsecured management interface exposed to adjecent network","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration."}],"affected":[{"vendor":"Red Hat","product":"RHEL-8 based Middleware Containers","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rh-sso-7/sso76-openshift-rhel8","defaultStatus":"affected","versions":[{"version":"7.6-20","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhosemc:1.0::el8"]},{"vendor":"Red Hat","product":"Red Hat Single Sign-On 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"rhsso-container-image","defaultStatus":"affected","cpes":["cpe:/a:redhat:red_hat_single_sign_on:7"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2023:1047","name":"RHSA-2023:1047","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2022-4039","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143416","name":"RHBZ#2143416","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2023-02-28T21:26:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-276","description":"Incorrect Default Permissions","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-276: Incorrect Default Permissions","timeline":[{"lang":"en","time":"2022-11-15T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-02-28T21:26:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"This issue was discovered by Thibault Guittet (Red Hat)."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2024-05-03T15:32:26.579Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.372Z"},"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/errata/RHSA-2023:1047","name":"RHSA-2023:1047","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"]},{"url":"https://access.redhat.com/security/cve/CVE-2022-4039","tags":["vdb-entry","x_refsource_REDHAT","x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143416","name":"RHBZ#2143416","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-24T14:18:24.812330Z","id":"CVE-2022-4039","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-24T14:29:55.579Z"}}]}}