ServiceAccount Exposure in Tempo Operator by Red Hat
CVE-2025-2786
Key Information:
- Vendor
- Red Hat
- Vendor
- CVE Published:
- 2 April 2025
Summary
A security flaw exists in the Tempo Operator, where the creation of ServiceAccount, ClusterRole, and ClusterRoleBinding upon deploying a TempoStack or TempoMonolithic can lead to information disclosure. A user with comprehensive access to their namespace can extract ServiceAccount tokens and submit TokenReview and SubjectAccessReview requests. This action may inadvertently unveil sensitive details regarding other users' permissions within the environment. Although this vulnerability does not allow for privilege escalation or user impersonation, it presents a vector for collecting critical information that could be exploited in future attacks.
Affected Version(s)
Red Hat OpenShift distributed tracing 3.5.1 sha256:29c1be152c9b2ca9fa8af25a10f156f8731b8396e8b2bc82d6b398a5e5027fdf
Red Hat OpenShift distributed tracing 3.5.1 sha256:e0e3273eceb8339638f2f1d91bb5eb6a57cfc0bc1442fcdea5fcff36812ccb4c
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved