cve-2024-37307
Vulnerability from cvelistv5
Published
2024-06-13 16:09
Modified
2024-08-19 17:04
Summary
Cilium leaks sensitive information in cilium-bugtool
References
security-advisories@github.comhttps://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407
security-advisories@github.comhttps://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a
security-advisories@github.comhttps://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741
security-advisories@github.comhttps://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653
security-advisories@github.comhttps://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b
security-advisories@github.comhttps://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61
security-advisories@github.comhttps://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61
af854a3a-2127-422b-91ae-364da2661108https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:50:55.958Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b"
          },
          {
            "name": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "cilium",
            "vendor": "cilium",
            "versions": [
              {
                "lessThan": "1.13.17",
                "status": "affected",
                "version": "1.13.0",
                "versionType": "custom"
              },
              {
                "lessThan": "1.14.12",
                "status": "affected",
                "version": "1.14.0",
                "versionType": "custom"
              },
              {
                "lessThan": "1.15.6",
                "status": "affected",
                "version": "1.15.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-37307",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-19T17:02:42.581479Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-19T17:04:31.162Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "cilium",
          "vendor": "cilium",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 1.13.0, \u003c 1.13.17"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.14.0, \u003c 1.14.12"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.15.0, \u003c 1.15.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-13T16:09:22.378Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b"
        },
        {
          "name": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61"
        }
      ],
      "source": {
        "advisory": "GHSA-wh78-7948-358j",
        "discovery": "UNKNOWN"
      },
      "title": "Cilium leaks sensitive information in cilium-bugtool"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-37307",
    "datePublished": "2024-06-13T16:09:22.378Z",
    "dateReserved": "2024-06-05T20:10:46.497Z",
    "dateUpdated": "2024-08-19T17:04:31.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-37307\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-06-13T16:15:11.180\",\"lastModified\":\"2024-11-21T09:23:34.600\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination, Gateway API with TLS termination, and Kafka network policies with API key filtering features are affected. The sensitive data includes the CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API and the API keys used in Kafka-related network policy. `cilium-bugtool` is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster. This issue has been patched in Cilium v1.15.6, v1.14.12, and v1.13.17. There is no workaround to this issue.\"},{\"lang\":\"es\",\"value\":\"Cilium es una soluci\u00f3n de redes, observabilidad y seguridad con un plano de datos basado en eBPF. A partir de la versi\u00f3n 1.13.0 y anteriores a las versiones 1.13.7, 1.14.12 y 1.15.6, la salida de `cilium-bugtool` puede contener datos confidenciales cuando se ejecuta la herramienta (con el comando `--envoy-dump` conjunto de indicadores) contra implementaciones de Cilium con el proxy Envoy habilitado. Los usuarios de la inspecci\u00f3n TLS, Ingress con terminaci\u00f3n TLS, Gateway API con terminaci\u00f3n TLS y pol\u00edticas de red Kafka con funciones de filtrado de claves API se ven afectados. Los datos confidenciales incluyen el certificado de CA, la cadena de certificados y la clave privada utilizadas por las pol\u00edticas de red HTTP de Cilium y cuando se utiliza la API de Ingress/Gateway y las claves API utilizadas en la pol\u00edtica de red relacionada con Kafka. `cilium-bugtool` es una herramienta de depuraci\u00f3n que normalmente se invoca manualmente y no se ejecuta durante el funcionamiento normal de un cl\u00faster Cilium. Este problema se solucion\u00f3 en Cilium v1.15.6, v1.14.12 y v1.13.17. No existe workaround para este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"references\":[{\"url\":\"https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.