Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-66623

Опубликовано: 05 дек. 2025
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 and prior to 0.49.1, in some situations, Strimzi creates an incorrect Kubernetes Role which grants the Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands the GET access to all Kubernetes Secrets that exist in the given Kubernetes namespace. The issue is fixed in Strimzi 0.49.1.

A flaw was found in Strimzi. This vulnerability allows unauthorized GET access to all Kubernetes (K8s) Secrets that exist in the given Kubernetes (K8s) namespace via incorrect Kubernetes (K8s) Role creation.

Отчет

This vulnerability is rated Important for Red Hat AMQ Streams. Affected Strimzi versions 0.47.0 through 0.49.0 create an incorrect Kubernetes Role, granting Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands unauthorized GET access to all Kubernetes Secrets within the operator's namespace. This could lead to sensitive information disclosure.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
streams for Apache Kafka 2io.strimzi-strimziNot affected
streams for Apache Kafka 2io.strimzi-strimzi-drain-cleanerNot affected
streams for Apache Kafka 3io.strimzi-strimziNot affected
streams for Apache Kafka 3io.strimzi-strimzi-drain-cleanerNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-842
https://bugzilla.redhat.com/show_bug.cgi?id=2419499strimzi-kafka-operator: Strimzi: Incorrect Kubernetes Role creation leads to unauthorized secret access

EPSS

Процентиль: 8%
0.00028
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
4 месяца назад

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 and prior to 0.49.1, in some situations, Strimzi creates an incorrect Kubernetes Role which grants the Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands the GET access to all Kubernetes Secrets that exist in the given Kubernetes namespace. The issue is fixed in Strimzi 0.49.1.

CVSS3: 7.4
github
4 месяца назад

Strimzi allows unrestricted access to all Secrets in the same Kubernetes namespace from Kafka Connect and MirrorMaker 2 operands

EPSS

Процентиль: 8%
0.00028
Низкий

7.4 High

CVSS3