First published: Fri May 27 2022(Updated: )
In Red Hat Advanced Cluster Security for Kubernetes, it was found that Notifier secrets were not properly sanitized in the GraphQL API. Authenticated ACS users could exploit this by retrieving Notifiers from the GraphQL API, revealing secrets that could then be used to escalate their privileges. <a href="https://github.com/stackrox/stackrox/pull/1803">https://github.com/stackrox/stackrox/pull/1803</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Advanced Cluster Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2090957 is categorized as a medium risk due to the potential for privilege escalation.
Mitigation for REDHAT-BUG-2090957 involves updating to the latest patched version of Red Hat Advanced Cluster Security for Kubernetes.
Authenticated users of Red Hat Advanced Cluster Security for Kubernetes are affected by REDHAT-BUG-2090957.
Exploiting REDHAT-BUG-2090957 could allow an attacker to retrieve sensitive Notifier secrets and escalate their privileges.
Currently, there are no specific workarounds suggested for REDHAT-BUG-2090957 other than applying the security update.