fkie_cve-2024-53349
Vulnerability from fkie_nvd
Published
2025-03-21 16:15
Modified
2025-04-01 20:21
Severity ?
Summary
Insecure permissions in kuadrant v0.11.3 allow attackers to gain access to the service account's token, leading to escalation of privileges via the secretes component in the k8s cluster
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linuxfoundation | kuadrant | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:kuadrant:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCF51F2E-444B-4404-87F7-3E0FF321DCA3", "versionEndIncluding": "0.11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in kuadrant v0.11.3 allow attackers to gain access to the service account\u0027s token, leading to escalation of privileges via the secretes component in the k8s cluster" }, { "lang": "es", "value": "Los permisos inseguros en kuadrant v0.11.3 permiten a los atacantes obtener acceso al token de la cuenta de servicio, lo que lleva a una escalada de privilegios a trav\u00e9s del componente secretes en el cl\u00faster k8s" } ], "id": "CVE-2024-53349", "lastModified": "2025-04-01T20:21:31.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-03-21T16:15:18.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/HouqiyuA/2a34c8f95dac7d9d8d7df7732403f383" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/Kuadrant/kuadrant-operator" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.cncf.io/projects/kuadrant/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…