Information Exposure Through Environmental Variables Affecting github.com/openshift/cluster-image-registry-operator package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENSHIFTCLUSTERIMAGEREGISTRYOPERATOR-6748545
  • published1 May 2024
  • disclosed30 Apr 2024
  • creditUnknown

Introduced: 30 Apr 2024

CVE-2024-4369  (opens in a new tab)
CWE-526  (opens in a new tab)

How to fix?

There is no fixed version for github.com/openshift/cluster-image-registry-operator.

Overview

github.com/openshift/cluster-image-registry-operator is a The registry operator manages a singleton instance of the openshift registry. It manages all configuration of the registry including creating storage.

Affected versions of this package are vulnerable to Information Exposure Through Environmental Variables due to the exposure of AZURE_CLIENT_SECRET through an environment variable defined in the pod definition, limited to Azure environments. An attacker controlling an account with sufficient permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.

Note

This is only exploitable if the attacker has high enough permissions to access pod information within the specified namespace.

CVSS Scores

version 3.1