Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0237 | Kruise provides automated management of large-scale applications on Kubernetes. Starting in version 0.8.0 and prior to versions 1.3.1, 1.4.1, and 1.5.2, an attacker who has gained root privilege of the node that kruise-daemon run can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, the attacker can leverage the "captured" secrets (e.g. the kruise-manager service account token) to gain extra privileges such as pod modification. Versions 1.3.1, 1.4.1, and 1.5.2 fix this issue. A workaround is available. For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege. |
Github GHSA |
GHSA-437m-7hj5-9mpw | Kruise allows leveraging the kruise-daemon pod to list all secrets in the entire cluster |
Mon, 16 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-16T18:10:14.525Z
Reserved: 2023-04-13T13:25:18.832Z
Link: CVE-2023-30617
Updated: 2024-08-02T14:28:52.019Z
Status : Modified
Published: 2024-01-03T16:15:08.117
Modified: 2024-11-21T08:00:31.090
Link: CVE-2023-30617
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA