CVE-2024-6538

5.3 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in OpenShift Console's /api/dev-console/proxy/internet endpoint. Authenticated users can make the console pod perform arbitrary HTTP requests to internal cluster services, bypassing intended internet-only restrictions. This affects OpenShift deployments with the console component enabled.

💻 Affected Systems

Products:
  • Red Hat OpenShift Container Platform
Versions: Multiple versions as indicated in RHSA advisories
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires OpenShift Console component to be enabled and user authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses sensitive internal services, exfiltrates credentials or data, or performs lateral movement within the cluster network.

🟠

Likely Case

Information disclosure from internal services, reconnaissance of cluster network topology, or limited data exfiltration.

🟢

If Mitigated

Minimal impact if network segmentation prevents console pod from accessing sensitive services.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to OpenShift Console.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific RHSA advisories for version details

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:14397

Restart Required: Yes

Instructions:

1. Review RHSA advisories for your OpenShift version. 2. Apply security updates via OpenShift update channels. 3. Restart affected console pods.

🔧 Temporary Workarounds

Network Policy Restriction

linux

Implement network policies to restrict console pod egress to only required external endpoints

oc apply -f network-policy.yaml

Endpoint Access Control

linux

Use OpenShift RBAC to restrict access to vulnerable endpoint

oc policy add-role-to-user -n openshift-console

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate console pods from sensitive internal services
  • Enforce least-privilege access controls and monitor for suspicious proxy requests

🔍 How to Verify

Check if Vulnerable:

Check OpenShift Console version and compare against patched versions in RHSA advisories

Check Version:

oc get pods -n openshift-console -o jsonpath='{.items[*].spec.containers[*].image}'

Verify Fix Applied:

Verify console pod version after update and test proxy endpoint functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from console pods to internal cluster IPs
  • Multiple requests to /api/dev-console/proxy/internet endpoint

Network Indicators:

  • Console pods making unexpected internal network connections
  • HTTP traffic from console to non-external destinations

SIEM Query:

source="openshift-console" AND uri_path="/api/dev-console/proxy/internet" AND dest_ip=~"10.*|192.168.*|172.*"

🔗 References

📤 Share & Export