CVE-2025-68476 (CNNVD-202512-3908)
中文标题:
keda 安全漏洞
英文标题:
KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential
漏洞描述
中文描述:
keda是KEDA开源的一个Kubernetes缩扩容软件。 keda 2.17.3之前版本和2.18.3之前版本存在安全漏洞,该漏洞源于TriggerAuthentication中路径验证不足,可能导致任意文件读取。
英文描述:
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| kedacore | keda | < 2.17.3 | - | - |
cpe:2.3:a:kedacore:keda:<_2.17.3:*:*:*:*:*:*:*
|
| kedacore | keda | >= 2.18.0, < 2.18.3 | - | - |
cpe:2.3:a:kedacore:keda:>=_2.18.0,_<_2.18.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68476 |
2025-12-23 04:10:02 | 2026-01-12 02:12:30 |
| NVD | nvd_CVE-2025-68476 |
2025-12-24 03:00:04 | 2026-01-12 02:28:14 |
| CNNVD | cnnvd_CNNVD-202512-3908 |
2026-01-11 06:15:07 | 2026-01-12 02:38:04 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202512-3908
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']