2024-09-18 08:03:18 +00:00

123 lines
4.2 KiB
JSON

{
"id": "CVE-2024-7557",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-12T13:38:43.727",
"lastModified": "2024-09-18T07:15:04.293",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenShift AI that allows for authentication bypass and privilege escalation across models within the same namespace. When deploying AI models, the UI provides the option to protect models with authentication. However, credentials from one model can be used to access other models and APIs within the same namespace. The exposed ServiceAccount tokens, visible in the UI, can be utilized with oc --token={token} to exploit the elevated view privileges associated with the ServiceAccount, leading to unauthorized access to additional resources."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en OpenShift AI que permite omitir la autenticaci\u00f3n y escalar privilegios entre modelos dentro del mismo espacio de nombres. Al implementar modelos de IA, la interfaz de usuario ofrece la opci\u00f3n de proteger los modelos con autenticaci\u00f3n. Sin embargo, las credenciales de un modelo se pueden utilizar para acceder a otros modelos y API dentro del mismo espacio de nombres. Los tokens de ServiceAccount expuestos, visibles en la interfaz de usuario, se pueden utilizar con oc --token={token} para explotar los privilegios de vista elevados asociados con ServiceAccount, lo que genera acceso no autorizado a recursos adicionales."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_ai:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0A70A-E606-48C8-82C2-4D8760146265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7557",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303094",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}