CVE-2024-33398

There is a ClusterRole in piraeus-operator v2.5.0 and earlier which has been granted list secrets permission, which allows an attacker to impersonate the service account bound to this ClusterRole and use its high-risk privileges to list confidential information across the cluster.
Configurations

No configuration.

History

21 Nov 2024, 09:16

Type Values Removed Values Added
References () https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb - () https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb -
References () https://github.com/HouqiyuA/k8s-rbac-poc - () https://github.com/HouqiyuA/k8s-rbac-poc -
References () https://github.com/piraeusdatastore/piraeus-operator - () https://github.com/piraeusdatastore/piraeus-operator -
References () https://piraeus.io/ - () https://piraeus.io/ -

03 Jul 2024, 01:58

Type Values Removed Values Added
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) Hay un ClusterRole en piraeus-operator v2.5.0 y versiones anteriores al que se le ha otorgado permiso de lista de secretos, lo que permite a un atacante hacerse pasar por la cuenta de servicio vinculada a este ClusterRole y usar sus privilegios de alto riesgo para enumerar información confidencial en todo el clúster.

03 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 16:15

Updated : 2024-11-21 09:16


NVD link : CVE-2024-33398

Mitre link : CVE-2024-33398

CVE.ORG link : CVE-2024-33398


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management