Information Disclosure in Kube-audit-rest Logger by RichardoC
CVE-2025-24884
5.1MEDIUM
Key Information:
- Vendor
- Richardoc
- Status
- Kube-audit-rest
- Vendor
- CVE Published:
- 29 January 2025
Summary
The kube-audit-rest tool, which logs mutation and creation requests made to the Kubernetes API, is susceptible to an information disclosure issue. If the 'full-elastic-stack' example vector configuration was utilized in a real cluster, it would have resulted in the exposure of previous Kubernetes secrets within the audit messages. This serious flaw was remedied in version 1.0.16, highlighting the need for users to update promptly to secure sensitive information.
Affected Version(s)
kube-audit-rest < 1.0.16
References
CVSS V4
Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved