Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-25209

Опубликовано: 24 фев. 2025
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.

Отчет

Red Hat Product Security has rated this vulnerability as with Moderate severity. Although the secrets can be leaked by default there's no highly sensitive secrets in this specific namespace, limiting the possible impact from a successful attack.

Меры по смягчению последствий

There's no known mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Connectivity Link 1rhcl-operator-containerFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2347438RHCL: sharedSecretRef Can Be Used To Leak Secrets Severity

EPSS

Процентиль: 5%
0.00022
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
nvd
7 месяцев назад

The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.

CVSS3: 5.7
github
7 месяцев назад

The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.

EPSS

Процентиль: 5%
0.00022
Низкий

5.7 Medium

CVSS3

Уязвимость CVE-2025-25209