External Secrets Operator is a Kubernetes operator that integrates external secret management systems. The external-secrets has a deployment called default-external-secrets-cert-controller, which is bound with a same-name ClusterRole. This ClusterRole has "get/list" verbs of secrets resources. It also has path/update verb of validatingwebhookconfigurations resources. This can be used to abuse the SA token of the deployment to retrieve or get ALL secrets in the whole cluster, capture and log all data from requests attempting to update Secrets, or make a webhook deny all Pod create and update requests. This vulnerability is fixed in 0.10.2.
References
Configurations
History
18 Sep 2024, 17:31
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 | |
First Time |
External-secrets external Secrets Operator
External-secrets |
|
References | () https://github.com/external-secrets/external-secrets/commit/428a452fd2ad45935312f2c2c0d40bc37ce6e67c - Patch | |
References | () https://github.com/external-secrets/external-secrets/security/advisories/GHSA-qwgc-rr35-h4x9 - Vendor Advisory | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:external-secrets:external_secrets_operator:*:*:*:*:*:*:*:* |
09 Sep 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-09 15:15
Updated : 2024-09-18 17:31
NVD link : CVE-2024-45041
Mitre link : CVE-2024-45041
CVE.ORG link : CVE-2024-45041
JSON object : View
Products Affected
external-secrets
- external_secrets_operator