Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3563 | A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment. |
Github GHSA |
GHSA-77c2-c35q-254w | OpenShift Must Gather Operator Improper Input Validation vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 28 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 19 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Dec 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | openshift-dedicated: must-gather-operator: YAML template injection leads to privilege escalation | Openshift-dedicated: must-gather-operator: yaml template injection leads to privilege escalation |
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-07-23T22:46:15.035Z
Reserved: 2024-02-05T18:35:14.363Z
Link: CVE-2024-25131
Updated: 2024-12-19T14:53:09.503Z
Status : Received
Published: 2024-12-19T15:15:07.070
Modified: 2024-12-19T15:15:07.070
Link: CVE-2024-25131
OpenCVE Enrichment
No data.
EUVD
Github GHSA