Miggo Logo

CVE-2025-47282: Gardener External DNS Management allows malicious google credential in DNS secret to lead to privilege escalation

9.9

CVSS Score
3.0

Basic Information

EPSS Score
0.31751%
Published
5/19/2025
Updated
5/19/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/gardener/external-dns-managementgo< 0.23.60.23.6
github.com/gardener/gardener-extension-shoot-dns-servicego<= 1.6.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability allows privilege escalation through malicious Google Cloud credentials in a DNS secret. The fix, identified in commit 4cd7f49a9e548bc32ef573be2114c547c3d3f946, introduces validation for the 'project_id' within the service account JSON. The function NewHandler in pkg/controller/provider/google/handler.go was modified to incorporate this validation. Before this patch, NewHandler would process the service account JSON without this specific validation, making it the function that handles the potentially malicious input and is therefore vulnerable. The newly added function validateServiceAccountJSON is part of the mitigation, not the vulnerable code itself.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s**urity vuln*r**ility w*s *is*ov*r** in **r**n*r t**t *oul* *llow * us*r wit* **ministr*tiv* privil***s *or * **r**n*r proj**t or * us*r wit* **ministr*tiv* privil***s *or * s*oot *lust*r, in*lu*in* **ministr*tiv* privil***s *or * sin*l* n*m*sp***

Reasoning

T** vuln*r**ility *llows privil*** *s**l*tion t*rou** m*li*ious *oo*l* *lou* *r***nti*ls in * *NS s**r*t. T** *ix, i**nti*i** in *ommit ****************************************, intro*u**s v*li**tion *or t** 'proj**t_i*' wit*in t** s*rvi** ***ount JS