cvelist/2024/13xxx/CVE-2024-13484.json

101 lines
3.8 KiB
JSON
Raw Normal View History

2025-01-16 20:00:56 +00:00
{
2025-01-28 18:00:59 +00:00
"data_version": "4.0",
2025-01-16 20:00:56 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-13484",
2025-01-28 18:00:59 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2025-01-16 20:00:56 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-02-12 17:00:33 +00:00
"value": "A flaw was found in openshift-gitops-operator-container. The openshift.io/cluster-monitoring label is applied to all namespaces that deploy an ArgoCD CR instance, allowing the namespace to create a rogue PrometheusRule. This issue can have adverse effects on the platform monitoring stack, as the rule is rolled out cluster-wide when the label is applied."
2025-01-28 18:00:59 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2025-02-12 17:00:33 +00:00
"value": "Exposure of Resource to Wrong Sphere",
"cweId": "CWE-668"
2025-01-28 18:00:59 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat OpenShift GitOps",
"version": {
"version_data": [
2025-02-12 17:00:33 +00:00
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
2025-01-28 18:00:59 +00:00
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-13484",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-13484"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269376",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2269376"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2025-01-16 20:00:56 +00:00
}
]
}
}