7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.4%
github.com/openshift/cluster-monitoring-operator is vulnerable to Exposure of Sensitive Information. The vulnerability is due to an annotation in the telemeter-client pod in the openshift-monitoring namespace that contains the cluster’s pull secret, which can be accessed by users with sufficient permissions, resulting in the exposing sensitive information.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/openshift/cluster-monitoring-operator | eq | HEAD | |
github.com/openshift/cluster-monitoring-operator | eq | HEAD |
access.redhat.com/errata/RHSA-2024:1887
access.redhat.com/errata/RHSA-2024:1891
access.redhat.com/errata/RHSA-2024:2047
access.redhat.com/errata/RHSA-2024:2782
access.redhat.com/security/cve/CVE-2024-1139
bugzilla.redhat.com/show_bug.cgi?id=2262158
github.com/advisories/GHSA-x5m7-63c6-fx79
github.com/openshift/cluster-monitoring-operator/blob/d45a3335c2bbada0948adef9fcba55c4e14fa1d7/pkg/manifests/manifests.go#L3135
github.com/openshift/cluster-monitoring-operator/commit/1cfbe9ffafe1e43f8f87a451b72fddf5d76fa4e3
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.4%