Information Exposure Through Environmental Variables Affecting github.com/openshift/cluster-image-registry-operator package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMOPENSHIFTCLUSTERIMAGEREGISTRYOPERATOR-6748545
  • published 1 May 2024
  • disclosed 30 Apr 2024
  • credit Unknown

How to fix?

There is no fixed version for github.com/openshift/cluster-image-registry-operator.

Overview

github.com/openshift/cluster-image-registry-operator is a The registry operator manages a singleton instance of the openshift registry. It manages all configuration of the registry including creating storage.

Affected versions of this package are vulnerable to Information Exposure Through Environmental Variables due to the exposure of AZURE_CLIENT_SECRET through an environment variable defined in the pod definition, limited to Azure environments. An attacker controlling an account with sufficient permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.

Note

This is only exploitable if the attacker has high enough permissions to access pod information within the specified namespace.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.8 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None