Products
OpenShift
Source
secalert@redhat.com
Tags
CVE-2024-4369 details
Published : May 1, 2024, 12:15 a.m.
Last Modified : May 1, 2024, 1:02 p.m.
Last Modified : May 1, 2024, 1:02 p.m.
Description
An information disclosure flaw was found in OpenShift's internal image registry operator. AZURE_CLIENT_SECRET can be exposed through an environment variable defined in the pod definition, but is limited to Azure environments. An attacker controlling an account that has high enough permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.8 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
6.8
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
References
URL | Source |
---|---|
https://access.redhat.com/security/cve/CVE-2024-4369 | secalert@redhat.com |
https://bugzilla.redhat.com/show_bug.cgi?id=2278035 | secalert@redhat.com |
This website uses the NVD API, but is not approved or certified by it.