Miggo Logo

CVE-2025-24884: kube-audit-rest's example logging configuration could disclose secret values in the audit log

N/A

CVSS Score

Basic Information

EPSS Score
0.13646%
Published
1/29/2025
Updated
2/5/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/RichardoC/kube-audit-restgo< 0.0.0-20250205113217-9df8886b48190.0.0-20250205113217-9df8886b4819

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incomplete redaction logic in the example Vector configuration. While the original code redacted .data fields, it neglected to remove the 'last-applied-configuration' annotation which contains serialized Secret data. This configuration-level function (expressed in VRL syntax) processes audit logs but left sensitive annotations intact. The commit diff clearly shows the addition of annotation deletion operations to address this oversight, confirming this as the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ I* t** "*ull-*l*sti*-st**k" *x*mpl* v**tor *on*i*ur*tion w*s us** *or * r**l *lust*r, t** pr*vious v*lu*s o* ku**rn*t*s s**r*ts woul* **v* ***n *is*los** in t** *u*it m*ss***s. ### P*t*

Reasoning

T** vuln*r**ility st*ms *rom in*ompl*t* r****tion lo*i* in t** *x*mpl* V**tor *on*i*ur*tion. W*il* t** ori*in*l *o** r****t** .**t* *i*l*s, it n**l**t** to r*mov* t** 'l*st-*ppli**-*on*i*ur*tion' *nnot*tion w*i** *ont*ins s*ri*liz** S**r*t **t*. T*is