Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands
Vulnerability Description
A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Vulnerability Type
未有动机的代理或中间人(混淆代理)
Vulnerability Title
Red Hat Runtimes Inventory Operator 安全漏洞
Vulnerability Description
Red Hat Runtimes Inventory Operator是美国红帽(Red Hat)公司的一个程序运行时环境管理软件。 Red Hat Runtimes Inventory Operator存在安全漏洞,该漏洞源于内部代理组件配置不当,可能导致标准用户以集群管理员权限执行未授权命令。
CVSS Information
N/A
Vulnerability Type
N/A