Products
External Secrets Operator
- < 0.10.2
Source
security-advisories@github.com
Tags
CVE-2024-45041 details
Last Modified : Sept. 9, 2024, 6:30 p.m.
Description
External Secrets Operator is a Kubernetes operator that integrates external secret management systems. The external-secrets has a deployment called default-external-secrets-cert-controller, which is bound with a same-name ClusterRole. This ClusterRole has "get/list" verbs of secrets resources. It also has path/update verb of validatingwebhookconfigurations resources. This can be used to abuse the SA token of the deployment to retrieve or get ALL secrets in the whole cluster, capture and log all data from requests attempting to update Secrets, or make a webhook deny all Pod create and update requests. This vulnerability is fixed in 0.10.2.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.3 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-269 | Improper Privilege Management | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
HIGH
Base Score
8.3
Exploitability Score
2.8
Impact Score
5.5
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
References
URL | Source |
---|---|
https://github.com/external-secrets/external-secrets/commit/428a452fd2ad45935312f2c2c0d40bc37ce6e67c | security-advisories@github.com |
https://github.com/external-secrets/external-secrets/security/advisories/GHSA-qwgc-rr35-h4x9 | security-advisories@github.com |