Security Flaw in Tempo Operator Affecting Cluster Monitoring Permissions
CVE-2025-2842
Key Information:
- Vendor
- Red Hat
- Vendor
- CVE Published:
- 2 April 2025
Summary
A security flaw exists within the Tempo Operator that affects systems utilizing the Jaeger UI Monitor Tab functionality. When this feature is enabled, the Operator incorrectly creates a ClusterRoleBinding for the corresponding Tempo instance's Service Account, granting it access to the cluster-monitoring-view ClusterRole. This vulnerability can be exploited by users with 'create' permissions on TempoStack and 'get' permissions on Secrets in a specified namespace, permitting them to access the token for Tempo's service account. Consequently, these users can view all cluster metrics, leading to potential exposure of sensitive monitoring data.
Affected Version(s)
Red Hat OpenShift distributed tracing 3.5.1 sha256:29c1be152c9b2ca9fa8af25a10f156f8731b8396e8b2bc82d6b398a5e5027fdf
Red Hat OpenShift distributed tracing 3.5.1 sha256:e0e3273eceb8339638f2f1d91bb5eb6a57cfc0bc1442fcdea5fcff36812ccb4c
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved