Описание
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
Отчет
Red Hat has evaluated this vulnerability and rated with a Moderate impact as the attacker is limited to read access and requires previous permissions to read the token and get access to the cluster metrics.
Меры по смягчению последствий
Currently, no mitigation is available for this vulnerability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat OpenShift distributed tracing 3 | rhosdt/tempo-gateway-rhel8 | Affected | ||
Red Hat OpenShift distributed tracing 3 | rhosdt/tempo-jaeger-query-rhel8 | Affected | ||
Red Hat OpenShift distributed tracing 3 | rhosdt/tempo-query-rhel8 | Affected | ||
Red Hat OpenShift distributed tracing 3 | rhosdt/tempo-rhel8 | Affected | ||
Red Hat OpenShift distributed tracing 3 | rhosdt/tempo-rhel8-operator | Affected | ||
Red Hat OpenShift distributed tracing 3.5.3 | registry.redhat.io/rhosdt/tempo-rhel8-operator | Fixed | RHSA-2025:3607 | 04.04.2025 |
Red Hat OpenShift distributed tracing 3.5.3 | registry.redhat.io/rhosdt/tempo-rhel8-operator | Fixed | RHSA-2025:3740 | 09.04.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS3
Связанные уязвимости
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
EPSS
4.3 Medium
CVSS3