CVE-2024-25133: OpenShift Hive RCE through AWS/Kubernetes client configuration leads to privilege escalation
(updated )
A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod.
References
- access.redhat.com/security/cve/CVE-2024-25133
- bugzilla.redhat.com/show_bug.cgi?id=2260372
- github.com/advisories/GHSA-wgqq-9qh8-wvqv
- github.com/openshift/hive
- github.com/openshift/hive/commit/5ba846620f9dbf49301dabb0d40cc980aabef4e0
- github.com/openshift/hive/pull/2306
- nvd.nist.gov/vuln/detail/CVE-2024-25133
Detect and mitigate CVE-2024-25133 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →