cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-45497,https://securityvulnerability.io/vulnerability/CVE-2024-45497,OpenShift Build Process Vulnerability Affecting Red Hat Products,"A significant vulnerability exists in the OpenShift build process, where the docker-build container is improperly configured with a hostPath volume mount that links the node's /var/lib/kubelet/config.json file to the build pod. This critical file contains sensitive credentials essential for accessing private repositories. The flawed configuration permits unprivileged write access, allowing attackers to overwrite this file. As a result, by modifying the config.json file, an attacker can cause a denial of service, disrupting the ability of the node to pull new container images. Additionally, this vulnerability poses significant risks by potentially allowing unauthorized access to sensitive credentials, which could lead to further compromises within the system.",Red Hat,"Red Hat Fuse 7,Red Hat Openshift Container Platform 4",7.6,HIGH,0.0004400000034365803,false,false,false,false,false,false,false,2024-12-31T02:19:22.553Z,0 CVE-2024-12401,https://securityvulnerability.io/vulnerability/CVE-2024-12401,Cert-Manager Vulnerability Permits CPU-Based DoS Attack,"A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.",Red Hat,"Cert-manager Operator For Red Hat Openshift,Cryostat 3,Multicluster Engine For Kubernetes,Openshift Serverless,Red Hat Connectivity Link,Red Hat Openshift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Gitops",4.4,MEDIUM,0.0021299999207258224,false,false,false,false,,false,false,2024-12-12T09:06:03.612Z,0 CVE-2024-10963,https://securityvulnerability.io/vulnerability/CVE-2024-10963,Pam_Access Vulnerability: Bypassing Access Restrictions through Token Manipulation,"A vulnerability exists in PAM Access whereby certain entries in its configuration file can be incorrectly recognized as hostnames. This flaw enables attackers to masquerade as legitimate hostnames, potentially leading to unauthorized access to services and terminals. Systems leveraging PAM Access for managing user authentication could be compromised due to this misconfiguration issue, creating a significant risk for organizations relying on these security measures.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.4,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-11-07T16:02:34.873Z,0 CVE-2024-50311,https://securityvulnerability.io/vulnerability/CVE-2024-50311,Graphql: denial of service (dos) vulnerability via graphql batching,"A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.",Red Hat,Red Hat Openshift Container Platform 4,6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-10-22T14:15:00.000Z,0 CVE-2024-50312,https://securityvulnerability.io/vulnerability/CVE-2024-50312,Graphql: information disclosure via graphql introspection in openshift,"A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation.",Red Hat,Red Hat Openshift Container Platform 4,5.3,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-10-22T14:15:00.000Z,0 CVE-2024-9675,https://securityvulnerability.io/vulnerability/CVE-2024-9675,Buildah: buildah allows arbitrary directory mount,"A directory traversal vulnerability exists in Buildah, where cache mounts fail to properly validate user-specified paths against the designated cache directory. This flaw allows malicious users to utilize a 'RUN' instruction within a Container file to mount arbitrary directories from the host system into the container with read/write access. Such exploitation can lead to unauthorized access to host file systems, posing significant security risks for applications depending on Buildah.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 4.16,Red Hat Openshift Container Platform 4.17,Openshift Developer Tools And Services,Red Hat Enterprise Linux 7,Red Hat Openshift Container Platform 4,Red Hat Quay 3",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-10-09T15:15:00.000Z,0 CVE-2024-7207,https://securityvulnerability.io/vulnerability/CVE-2024-7207,Envoy Proxy Vulnerability Allows Header Manipulation and Request Forgery,"The vulnerability identified has been marked as a duplicate of CVE-2024-45806, suggesting a redundancy in reporting. However, it is critical to monitor and address any existing weaknesses in Envoy Proxy that may arise from overlapping vulnerabilities. Users and system administrators should stay informed about security advisories from the Envoy Project to ensure all systems running Envoy are updated and compliant with the latest security practices.",Red Hat,Openshift Service Mesh 2,9.8,CRITICAL,0.0004299999854993075,false,false,false,false,,false,false,2024-09-19T22:17:51.582Z,0 CVE-2024-8418,https://securityvulnerability.io/vulnerability/CVE-2024-8418,Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service,"Aardvark-dns has a vulnerability that allows attackers to conduct Denial of Service (DoS) attacks through improper handling of TCP DNS queries. The flaw arises from the serial processing of these queries, which permits an attacker to maintain a TCP connection indefinitely. This behavior can lead to the DNS server becoming unresponsive as legitimate queries time out, greatly affecting DNS service availability and disrupting normal operations for users.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-09-04T15:15:00.000Z,0 CVE-2024-7557,https://securityvulnerability.io/vulnerability/CVE-2024-7557,Authentication Bypass and Privilege Escalation Vulnerability in OpenShift AI,"In OpenShift AI, a vulnerability exists that permits authentication bypass and privilege escalation across models within the same namespace. This concern arises during AI model deployment, where the user interface allows the configuration of authentication for models. Unfortunately, tokens from one model are inadvertently usable for accessing other models and APIs within the same namespace. The vulnerability is exacerbated by the exposure of ServiceAccount tokens in the UI, enabling malicious users to exploit these tokens through commands like 'oc --token={token}', thereby gaining unauthorized access to resources and elevating privileges significantly.",Red Hat,"Red Hat Openshift Ai (rhoai),Red Hat Openshift Data Science (rhods)",8.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2024-43167,https://securityvulnerability.io/vulnerability/CVE-2024-43167,Segmentation Fault Vulnerability in Unbound's ub_ctx_set_fwd Function,"A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",2.8,LOW,0.00044999999227002263,false,false,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2024-43168,https://securityvulnerability.io/vulnerability/CVE-2024-43168,Unbound: heap-buffer-overflow in unbound,"A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",4.8,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2024-7409,https://securityvulnerability.io/vulnerability/CVE-2024-7409,QEMU NBD Server Vulnerability: DoS Attack via Socket Closure,A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.,Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.15,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Enterprise Linux 9",,,0.0004600000102072954,false,false,false,false,,false,false,2024-08-05T13:19:27.498Z,0 CVE-2024-7128,https://securityvulnerability.io/vulnerability/CVE-2024-7128,Openshift Console Flaw Allows Data Exposure Without Proper Credential Verification,"A flaw was found in the OpenShift console. Several endpoints in the application use the authHandler() and authHandlerWithUser() middleware functions. When the default authentication provider (""openShiftAuth"") is set, these functions do not perform any authentication checks, relying instead on the targeted service to handle authentication and authorization. This issue leads to various degrees of data exposure due to a lack of proper credential verification.",Red Hat,"Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4",5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-26T13:34:19.647Z,0 CVE-2024-7079,https://securityvulnerability.io/vulnerability/CVE-2024-7079,Unauthorized Access to /API/helm/verify Endpoint in Openshift,"A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.",Red Hat,"Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-24T15:51:36.331Z,0 CVE-2024-3653,https://securityvulnerability.io/vulnerability/CVE-2024-3653,Undertow Vulnerability: Enabling Learning-Push Handler Can Prevent Attacks,"A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.",Red Hat,"Red Hat Jboss Enterprise Application Platform 7.1.0,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 8,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 9,Red Hat Jboss Enterprise Application Platform 7.4 On Rhel 7,Red Hat Jboss Enterprise Application Platform 8,Openshift Serverless,Red Hat Build Of Apache Camel For Quarkus,Red Hat Build Of Apache Camel For Spring Boot,Red Hat Build Of Apache Camel - Hawtio,Red Hat Build Of Apicurio Registry,Red Hat Build Of Keycloak,Red Hat Build Of Optaplanner 8,Red Hat Build Of Quarkus,Red Hat Data Grid 8,Red Hat Integration Camel K,Red Hat Integration Camel Quarkus,Red Hat Jboss Data Grid 7,Red Hat Jboss Enterprise Application Platform Expansion Pack,Red Hat Jboss Fuse 7,Red Hat Jboss Fuse Service Works 6,Red Hat Process Automation 7,Red Hat Single Sign-on 7,Streams For Apache Kafka",5.3,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-07-08T21:21:20.899Z,0 CVE-2024-4467,https://securityvulnerability.io/vulnerability/CVE-2024-4467,QEMU qemu-img Vulnerability: Memory or CPU Consumption Denial of Service,"A vulnerability exists in the QEMU disk image utility related to the 'info' command, where a specially crafted image file containing a specific JSON value can cause the qemu-img process to use an excessive amount of system resources. This behavior may result in resource exhaustion, potentially leading to a denial of service. The exploit can also enable unauthorized read/write access to existing external files on the host system, creating a significant security risk for affected environments.",Red Hat,"Advanced Virtualization For Rhel 8.2.1,Advanced Virtualization For Rhel 8.4.0.eus,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Openshift Virtualization 4",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-07-02T16:15:00.000Z,0 CVE-2024-6387,https://securityvulnerability.io/vulnerability/CVE-2024-6387,Signal Handler Race Condition in OpenSSH's Server,"A regression vulnerability discovered in OpenSSH's server (sshd) involves a race condition affecting the handling of signals. This vulnerability allows an attacker to exploit the sshd service by failing to authenticate within a specified timeframe. If successfully triggered, this flaw could alter the normal operation of the sshd service. As a result, an unauthenticated remote attacker may gain the ability to execute arbitrary code, potentially compromising the affected system. This vulnerability underscores the importance of timely security updates and robust configurations to safeguard systems running OpenSSH.",Red Hat,"Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Openshift Container Platform 4",8.1,HIGH,0.0031900000758469105,false,true,false,true,true,true,true,2024-07-01T12:37:25.431Z,159237 CVE-2024-5154,https://securityvulnerability.io/vulnerability/CVE-2024-5154,Container Orchestration Flaw Allows Arbitrary File Access,"A directory traversal vulnerability exists in CRI-O that can be exploited by a malicious container. This vulnerability allows an attacker to create symbolic links to arbitrary files on the host system using path traversal techniques such as ""../"". As a result, sensitive files may be accessed or modified, potentially compromising the security of the host environment. This flaw highlights the importance of secure container management practices and timely updates to mitigate risks associated with such vulnerabilities.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 3.11",8.1,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-06-12T08:51:43.565Z,0 CVE-2024-4369,https://securityvulnerability.io/vulnerability/CVE-2024-4369,Information Disclosure Flaw in OpenShift Image Registry Operator Could Lead to Identity Theft,"An information disclosure flaw was found in OpenShift's internal image registry operator. The AZURE_CLIENT_SECRET can be exposed through an environment variable defined in the pod definition, but is limited to Azure environments. An attacker controlling an account that has high enough permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.",Red Hat,"Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15",6.8,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-05-01T00:15:00.000Z,0 CVE-2024-3154,https://securityvulnerability.io/vulnerability/CVE-2024-3154,Arbitrary Systemd Property Injection Vulnerability in cri-o,"A vulnerability exists in the cri-o container runtime where attackers can inject arbitrary systemd properties through Pod annotations. This flaw allows any user with the capability to create a Pod to conduct unauthorized actions on the host system, posing significant security risks. Organizations utilizing affected versions of cri-o are advised to implement mitigations and updates to prevent potential exploitation.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 3.11",7.2,HIGH,0.0004400000034365803,false,false,false,true,true,false,false,2024-04-26T04:15:00.000Z,0 CVE-2024-3623,https://securityvulnerability.io/vulnerability/CVE-2024-3623,Mirror-registry Flaw Exposes Quay Database Secrets,"A vulnerability exists in Quay's installation process via the mirror-registry, where a default database secret key is inadvertently stored in plain text within a configuration template file. This design flaw permits any instance of Quay deployed through this method to share the same database secret key, potentially compromising sensitive information. If exploited, this vulnerability allows malicious actors to gain unauthorized access to the database, posing significant risks to data integrity and confidentiality.",Red Hat,Mirror Registry For Red Hat Openshift,8.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-25T18:15:00.000Z,0 CVE-2024-3622,https://securityvulnerability.io/vulnerability/CVE-2024-3622,"Mirror-registry Flaw Affects Quay Instances, Leading to Session Cookie Tampering","A vulnerability exists in Red Hat's Quay product related to the installation process utilizing mirror-registry. The issue stems from the use of a default secret, which is stored in plaintext within one of the configuration template files. This oversight can result in all Quay instances deployed through mirror-registry sharing the same secret key. Consequently, this flaw may allow malicious actors to fabricate session cookies, potentially leading to unauthorized access to the affected Quay instance. It is crucial for users of Quay to review their configuration settings and implement secure practices to mitigate this risk.",Red Hat,Mirror Registry For Red Hat Openshift,8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-25T18:15:00.000Z,0 CVE-2024-3625,https://securityvulnerability.io/vulnerability/CVE-2024-3625,Plain Text Database Vulnerability Exposes Quay's Redis Instance to Attack,"A significant data exposure vulnerability has been identified in Quay, a popular container registry operated by Red Hat. The flaw arises from storing the Quay database in plain text within the mirror-registry configuration file, config.yaml. This configuration exposes critical data, potentially allowing malicious actors who gain access to this file to connect to the accessible Redis instance linked to Quay. This vulnerability underscores the importance of securing sensitive configuration files to prevent unauthorized access to backend services.",Red Hat,Mirror Registry For Red Hat Openshift,7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-25T18:15:00.000Z,0 CVE-2024-3624,https://securityvulnerability.io/vulnerability/CVE-2024-3624,Quay's Database Vulnerability: Plain-Text Storage Exposes Sensitive Data,"A security issue has been identified in Quay, a container registry service by Red Hat, involving the insecure storage of database credentials within the mirror-registry's configuration file (config.yaml). This flaw permits malicious actors, who gain access to this file, to retrieve sensitive database information, compromising the integrity and confidentiality of the data stored within Quay's database. It emphasizes the importance of securing configuration files and utilizing encryption for sensitive data storage to mitigate potential security threats.",Red Hat,Mirror Registry For Red Hat Openshift,7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-25T18:15:00.000Z,0 CVE-2024-1139,https://securityvulnerability.io/vulnerability/CVE-2024-1139,Remote Attacker May Discover Repository Pull Secret via Basic Login Credentials,"A credentials leak vulnerability has been identified in the cluster monitoring operator of OpenShift Container Platform (OCP). This issue potentially enables a remote attacker, armed with basic login credentials, to inspect the pod manifest. By doing so, the attacker may discover sensitive information, including repository pull secrets. Without proper remediation, this vulnerability could lead to unauthorized access to critical resources within the OCP environment.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Advanced Cluster Management For Kubernetes 2,Red Hat Openshift Container Platform 3.11",7.7,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-04-25T17:15:00.000Z,0