Incorrect Default Permissions Affecting github.com/hwameistor/hwameistor package, versions <0.14.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Default Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMHWAMEISTORHWAMEISTOR-7558688
  • published25 Jul 2024
  • disclosed28 Apr 2024
  • creditHouqiyuA

Introduced: 28 Apr 2024

CVE-2024-36534  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

Upgrade github.com/hwameistor/hwameistor to version 0.14.6 or higher.

Overview

github.com/hwameistor/hwameistor is a high availability local storage system for cloud-native stateful workloads

Affected versions of this package are vulnerable to Incorrect Default Permissions granted to the hwameistor-admin user by default, which include the update/patch verb on the nodes resource. An attacker in possession of the ServiceAccount token can escalate privileges on the underlying cluster.

Note: This vulnerability has also been published as CVE-2024-45054.

CVSS Scores

version 4.0
version 3.1