Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9wh7-397j-722m

Опубликовано: 26 апр. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6

Описание

Ironic and ironic-inspector may expose as ConfigMaps

Impact

Ironic and ironic-inspector deployed within Baremetal Operator using the included deploy.sh store their .htpasswd files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage.

Patches

This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards.

Workarounds

User may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241

Пакеты

Наименование

github.com/metal3-io/baremetal-operator

go
Затронутые версииВерсия исправления

< 0.3.0

0.3.0

EPSS

Процентиль: 2%
0.00015
Низкий

6 Medium

CVSS3

Дефекты

CWE-200
CWE-319

Связанные уязвимости

CVSS3: 6
redhat
почти 3 года назад

Baremetal Operator (BMO) is a bare metal host provisioning integration for Kubernetes. Prior to version 0.3.0, ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage. This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards. As a workaround, users may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241.

CVSS3: 6
nvd
почти 3 года назад

Baremetal Operator (BMO) is a bare metal host provisioning integration for Kubernetes. Prior to version 0.3.0, ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage. This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards. As a workaround, users may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241.

EPSS

Процентиль: 2%
0.00015
Низкий

6 Medium

CVSS3

Дефекты

CWE-200
CWE-319