Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68476

Опубликовано: 22 дек. 2025
Источник: redhat
CVSS3: 7.7

Описание

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

A flaw was found in KEDA, a Kubernetes-based Event Driven Autoscaling component. This arbitrary file read vulnerability allows an attacker with permissions to create or modify a TriggerAuthentication resource to read any file from the node's filesystem where the KEDA pod resides. This is due to insufficient path validation when handling Service Account Tokens during HashiCorp Vault authentication. Successful exploitation can lead to the exfiltration of sensitive system information, such as secrets or configuration files.

Отчет

This vulnerability is rated Important because an attacker with permissions to create or modify a KEDA TriggerAuthentication resource can perform arbitrary file reads from the node's filesystem. This impacts Red Hat OpenShift products that utilize KEDA with HashiCorp Vault authentication.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Deployment Validation Operatordvo/deployment-validation-rhel8-operatorAffected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel9Affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel9Affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-model-registry-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/mcg-cli-rhel9Affected
Red Hat Openshift Data Foundation 4odf4/mcg-rhel9-operatorAffected
Red Hat Openshift Data Foundation 4odf4/odf-cli-rhel9Affected
Custom Metric Autoscaler operator for Red Hat Openshift 2.18custom-metrics-autoscaler/custom-metrics-autoscaler-adapter-rhel9FixedRHSA-2026:236809.02.2026
Custom Metric Autoscaler operator for Red Hat Openshift 2.18custom-metrics-autoscaler/custom-metrics-autoscaler-admission-webhooks-rhel9FixedRHSA-2026:236809.02.2026
Custom Metric Autoscaler operator for Red Hat Openshift 2.18custom-metrics-autoscaler/custom-metrics-autoscaler-rhel9FixedRHSA-2026:236809.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2424509github.com/kedacore/keda: KEDA: Arbitrary file read vulnerability in Vault authentication

7.7 High

CVSS3

Связанные уязвимости

nvd
3 месяца назад

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

msrc
3 месяца назад

KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential

github
3 месяца назад

KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential

7.7 High

CVSS3