Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12582

Опубликовано: 20 дек. 2024
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

A flaw was found in the skupper console, a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the "admin" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.

Отчет

This vulnerability is rated as an Important severity due to the risk of data confidentiality breaches and potential denial-of-service attacks where attackers can manipulate the default authentication method to access sensitive files and exhaust system resources by reading large files, affecting both data integrity and service availability in hybrid multi-cloud environments.

Меры по смягчению последствий

For users running skupper on Red Hat OpenShift, the OpenShift authentication should be used. Otherwise, use "unsecured" where authentication is not a primary concern.

Дополнительная информация

Статус:

Important
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=2333540skupper: skupper-cli: Flawed authentication method may lead to arbitrary file read or Denial of Service

EPSS

Процентиль: 24%
0.00082
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
около 1 года назад

A flaw was found in the skupper console, a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the "admin" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.

CVSS3: 7.1
github
около 1 года назад

A flaw was found in the skupper console, a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the "admin" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.

CVSS3: 7.1
fstec
около 1 года назад

Уязвимость интерфейса командной строки (CLI) пакета Skupper программного средства управления и интеграции микросервисов в облачных и гибридных средах Red Hat Service Interconnect, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании

EPSS

Процентиль: 24%
0.00082
Низкий

7.1 High

CVSS3