A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | openshift-dedicated: must-gather-operator: YAML template injection leads to privilege escalation | Openshift-dedicated: must-gather-operator: yaml template injection leads to privilege escalation |
References |
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-12-19T14:18:05.194Z
Updated: 2024-12-19T14:53:25.664Z
Reserved: 2024-02-05T18:35:14.363Z
Link: CVE-2024-25131
Vulnrichment
Updated: 2024-12-19T14:53:09.503Z
NVD
Status : Received
Published: 2024-12-19T15:15:07.070
Modified: 2024-12-19T15:15:07.070
Link: CVE-2024-25131
Redhat