First published: Wed Jun 21 2023(Updated: )
A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opendatahub Open Data Hub Dashboard | <1.28.1 | |
Redhat Openshift Data Science | ||
redhat/odh-dashboard | <1.28.1 | 1.28.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-3361.
The severity rating of CVE-2023-3361 is high with a value of 7.5.
The vulnerability affects Red Hat OpenShift Data Science, specifically the version 1.28.1 of the odh-dashboard package.
The vulnerability occurs when exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, which saves S3 credentials in plain text instead of an ID for a Kubernetes secret.
Yes, the fix for this vulnerability is available in version 1.28.1 of the odh-dashboard package.