A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can escalate their privileges.
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2090957 | issue tracking vendor advisory |
https://access.redhat.com/security/cve/CVE-2022-1902 | vendor advisory |
https://github.com/stackrox/stackrox/pull/1803 | exploit third party advisory patch |