Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1258 | Baremetal Operator (BMO) is a bare metal host provisioning integration for Kubernetes. Prior to version 0.3.0, ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage. This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards. As a workaround, users may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241. |
Github GHSA |
GHSA-9wh7-397j-722m | Ironic and ironic-inspector may expose as ConfigMaps |
Thu, 30 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-30T21:30:50.655Z
Reserved: 2023-04-18T16:13:15.880Z
Link: CVE-2023-30841
Updated: 2024-08-02T14:37:15.430Z
Status : Modified
Published: 2023-04-26T19:15:09.140
Modified: 2024-11-21T08:00:57.157
Link: CVE-2023-30841
OpenCVE Enrichment
No data.
EUVD
Github GHSA