A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3361 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2216588 | third party advisory issue tracking |
https://github.com/opendatahub-io/odh-dashboard/issues/1415 | issue tracking |