A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 28 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 19 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Dec 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | openshift-dedicated: must-gather-operator: YAML template injection leads to privilege escalation | Openshift-dedicated: must-gather-operator: yaml template injection leads to privilege escalation |
| References |
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-12-19T14:18:05.194Z
Updated: 2025-07-23T22:46:15.035Z
Reserved: 2024-02-05T18:35:14.363Z
Link: CVE-2024-25131
Updated: 2024-12-19T14:53:09.503Z
Status : Received
Published: 2024-12-19T15:15:07.070
Modified: 2024-12-19T15:15:07.070
Link: CVE-2024-25131