CVE-2024-45497

Published: Dic 31, 2024 Last Modified: Ott 21, 2025 EU-VD ID: EUVD-2024-41257
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,6
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: high

Description

AI Translation Available

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0058
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

732

Incorrect Permission Assignment for Critical Resource

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Integrity Other
Potential Impacts:
Read Application Data Read Files Or Directories Gain Privileges Or Assume Identity Modify Application Data Other
Applicable Platforms
Technologies: Not Technology-Specific, Cloud Computing
View CWE Details
https://access.redhat.com/errata/RHSA-2025:10270
https://access.redhat.com/errata/RHSA-2025:10294
https://access.redhat.com/errata/RHSA-2025:10747
https://access.redhat.com/errata/RHSA-2025:9269
https://access.redhat.com/errata/RHSA-2025:9562
https://access.redhat.com/errata/RHSA-2025:9759
https://access.redhat.com/errata/RHSA-2025:9765
https://access.redhat.com/security/cve/CVE-2024-45497
https://bugzilla.redhat.com/show_bug.cgi?id=2308673