We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25133

Openshift-dedicated: hive: rce through aws/kubernetes client configuration leads to privilege escalation



Description

A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod.

Reserved 2024-02-05 | Published 2024-12-31 | Updated 2024-12-31 | Assigner redhat


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Access Control

Product status

Default status
unaffected

Any version before 5ba846620f9dbf49301dabb0d40cc980aabef4e0
affected

Timeline

2024-01-24:Reported to Red Hat.
2024-06-12:Made public.

Credits

This issue was discovered by Thibault Guittet (Red Hat).

References

bugzilla.redhat.com/show_bug.cgi?id=2260372 (RHBZ#2260372) issue-tracking

github.com/openshift/hive/pull/2306

cve.org (CVE-2024-25133)

nvd.nist.gov (CVE-2024-25133)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-25133

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.