{"uuid": "8c9e18c4-cdc9-4c6d-9620-dd066d5eb83f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12582", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12582\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the skupper console,  a read-only interface that renders cluster network, traffic details, and metrics for a network application that a user sets up across a hybrid multi-cloud environment. When the default authentication method is used, a random password is generated for the \"admin\" user and is persisted in either a Kubernetes secret or a podman volume in a plaintext file. This authentication method can be manipulated by an attacker, leading to the reading of any user-readable file in the container filesystem, directly impacting data confidentiality. Additionally, the attacker may induce skupper to read extremely large files into memory, resulting in resource exhaustion and a denial of service attack.\n\ud83d\udccf Published: 2024-12-24T03:31:24.896Z\n\ud83d\udccf Modified: 2025-05-12T20:08:42.332Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:1413\n2. https://access.redhat.com/security/cve/CVE-2024-12582\n3. https://bugzilla.redhat.com/show_bug.cgi?id=2333540", "creation_timestamp": "2025-05-12T20:29:37.000000Z"}