CVE-2023-29018

The OpenFeature Operator allows users to expose feature flags to applications. Assuming the pre-existence of a vulnerability that allows for arbitrary code execution, an attacker could leverage the lax permissions configured on `open-feature-operator-controller-manager` to escalate the privileges of any SA in the cluster. The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets. Version 0.2.32 mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:openfeature:*:*:*:*:*:kubernetes:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
References () https://github.com/open-feature/open-feature-operator/releases/tag/v0.2.32 - Release Notes () https://github.com/open-feature/open-feature-operator/releases/tag/v0.2.32 - Release Notes
References () https://github.com/open-feature/open-feature-operator/security/advisories/GHSA-cwf6-xj49-wp83 - Vendor Advisory () https://github.com/open-feature/open-feature-operator/security/advisories/GHSA-cwf6-xj49-wp83 - Vendor Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.0

Information

Published : 2023-04-14 19:15

Updated : 2024-11-21 07:56


NVD link : CVE-2023-29018

Mitre link : CVE-2023-29018

CVE.ORG link : CVE-2023-29018


JSON object : View

Products Affected

linuxfoundation

  • openfeature
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo