The vulnerability is a critical missing authorization flaw in the Devtron Attributes API. The core issue is that several API handlers in api/restHandler/AttributesRestHandlder.go did not properly enforce authorization, allowing any authenticated user to read sensitive configuration data. The vulnerability description explicitly points out that the RBAC enforcement code was commented out in the GetAttributesByKey function.
The analysis of the patch commit d2b0d260d858ab1354b73a8f50f7f078ca62706f confirms this. The patch introduces a mechanism to classify certain attributes as internal-only (specifically the apiTokenSecret) and adds checks in multiple handler functions (GetAttributesByKey, GetAttributesById, GetAttributesActiveList) to prevent these attributes from being read through the API.
An attacker could exploit this by making a simple authenticated GET request to endpoints like /orchestrator/attributes?key=apiTokenSecret. This would return the HMAC-SHA256 signing key for all API JWT tokens. With this key, the attacker can forge JWT tokens for any user, including administrators, granting them complete control over the Devtron platform and potentially allowing lateral movement to the underlying Kubernetes cluster. The identified vulnerable functions are the direct entry points for this attack.