Lucene search

K
redhatcveRedhat.comRH:CVE-2019-3899
HistoryApr 18, 2019 - 4:50 p.m.

CVE-2019-3899

2019-04-1816:50:58
redhat.com
access.redhat.com
12

0.002 Low

EPSS

Percentile

61.9%

It was found that the default configuration of Heketi does not require any authentication, potentially exposing the Heketi server API to be misused. An unauthenticated attacker could connect remotely to Heketi Server and run arbitrary commands supported by Heketi Server API via Heketi CLI.

Mitigation

After installation of Heketi

1. configure user and admin key in /etc/heketi/heketi.json file

{
"_port_comment": "Heketi Server Port Number",
"port": "8080",

"_use_auth": "Enable JWT authorization. Please enable for deployment",
"use_auth": true,

"_jwt": "Private keys for access",
"jwt": {
"_admin": "Admin has access to all APIs",
"admin": {
"key": "My Secret"
},
"_user": "User only has access to /volumes endpoint",
"user": {
"key": "My Secret"
}
},

2. restart heketi server

0.002 Low

EPSS

Percentile

61.9%