High severity8.8NVD Advisory· Published Dec 19, 2024· Updated Apr 15, 2026
CVE-2024-25131
CVE-2024-25131
Description
A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/openshift/must-gatherGo | < 0.0.0-20240604173837-d1557bc283dd | 0.0.0-20240604173837-d1557bc283dd |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-77c2-c35q-254wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-25131ghsaADVISORY
- access.redhat.com/security/cve/CVE-2024-25131nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/openshift/must-gather-operator/pull/135nvdWEB
- github.com/openshift/must-gather-operator/pull/138nvdWEB
News mentions
0No linked articles in our index yet.