logo

CVE-2024-7631 github.com/openshift/console

Package

Manager: go
Name: github.com/openshift/console
Vulnerable Version: >=0 <=6.0.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00076 pctl0.23382

Details

OpenShift Console Has a Path Traversal Vulnerability A flaw was found in the OpenShift Console, an endpoint for plugins to serve resources in multiple languages: /locales/resources.json. This endpoint's lng and ns parameters are used to construct a filepath in pkg/plugins/handlers unsafely.go#L112 Because of this unsafe filepath construction, an authenticated user can manipulate the path to retrieve any JSON files on the console's pod by using sequences of ../ and valid directory paths.

Metadata

Created: 2025-03-19T21:30:52Z
Modified: 2025-03-20T18:10:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-69x5-hjg4-m267/GHSA-69x5-hjg4-m267.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-69x5-hjg4-m267
Finding: F063
Auto approve: 1