Логотип exploitDog
bind:CVE-2025-24784
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-24784

Количество 4

Количество 4

nvd логотип

CVE-2025-24784

около 1 года назад

kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. The policy group feature, added to by the 1.17.0 release. By being namespaced, the AdmissionPolicyGroup has a well constrained impact on cluster resources. Hence, it’s considered safe to allow non-admin users to create and manage these resources in the namespaces they own. Kubewarden policies can be allowed to query the Kubernetes API at evaluation time; these types of policies are called “context aware“. Context aware policies can perform list and get operations against a Kubernetes cluster. The queries are done using the ServiceAccount of the Policy Server instance that hosts the policy. That means that access to the cluster is determined by the RBAC rules that apply to that ServiceAccount. The AdmissionPolicyGroup CRD allowed the deployment of context aware policies. This could allow an attacker to obtain information about resources that are out of their reac

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-756x-m4mj-q96c

около 1 года назад

Kubewarden-Controller information leak via AdmissionPolicyGroup Resource

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2025-06261

около 1 года назад

Уязвимость компонента CRD AdmissionPolicyGroup контроллера в кластере Kubernetes kubewarden-controller, позволяющая нарушителю получить несанкционированный доступ на изменение данных или раскрыть защищаемую информацию

CVSS3: 4.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0429-1

12 месяцев назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-24784

kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. The policy group feature, added to by the 1.17.0 release. By being namespaced, the AdmissionPolicyGroup has a well constrained impact on cluster resources. Hence, it’s considered safe to allow non-admin users to create and manage these resources in the namespaces they own. Kubewarden policies can be allowed to query the Kubernetes API at evaluation time; these types of policies are called “context aware“. Context aware policies can perform list and get operations against a Kubernetes cluster. The queries are done using the ServiceAccount of the Policy Server instance that hosts the policy. That means that access to the cluster is determined by the RBAC rules that apply to that ServiceAccount. The AdmissionPolicyGroup CRD allowed the deployment of context aware policies. This could allow an attacker to obtain information about resources that are out of their reac

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-756x-m4mj-q96c

Kubewarden-Controller information leak via AdmissionPolicyGroup Resource

CVSS3: 4.3
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-06261

Уязвимость компонента CRD AdmissionPolicyGroup контроллера в кластере Kubernetes kubewarden-controller, позволяющая нарушителю получить несанкционированный доступ на изменение данных или раскрыть защищаемую информацию

CVSS3: 4.3
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0429-1

Security update for govulncheck-vulndb

12 месяцев назад

Уязвимостей на страницу