CVE-2024-12582

A flaw was found in the skupper console, a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the "admin" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.
Configurations

No configuration.

History

13 Feb 2025, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:1413 -

24 Dec 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 04:15

Updated : 2025-02-13 14:15


NVD link : CVE-2024-12582

Mitre link : CVE-2024-12582

CVE.ORG link : CVE-2024-12582


JSON object : View

Products Affected

No product.

CWE
CWE-305

Authentication Bypass by Primary Weakness