kube-audit-rest's example logging configuration could disclose secret values in the audit log
Moderate severity
GitHub Reviewed
Published
Jan 29, 2025
in
RichardoC/kube-audit-rest
•
Updated Feb 5, 2025
Package
Affected versions
< 0.0.0-20250205113217-9df8886b4819
Patched versions
0.0.0-20250205113217-9df8886b4819
Description
Published to the GitHub Advisory Database
Jan 29, 2025
Reviewed
Jan 29, 2025
Published by the National Vulnerability Database
Jan 29, 2025
Last updated
Feb 5, 2025
Impact
What kind of vulnerability is it? Who is impacted?
If the "full-elastic-stack" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit messages.
Patches
Has the problem been patched? What versions should users upgrade to?
The example has been updated to fix this in commit 9df8886b4819409f566233adc7c3b7a43a4096ba
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Replace
In the vector "audit-files-json-parser-and-redaction" step
with
References
Are there any links users can visit to find out more?
References