CVE-2025-24375 (GCVE-0-2025-24375)
Vulnerability from cvelistv5 – Published: 2025-04-09 22:21 – Updated: 2025-04-10 15:55
VLAI?
Summary
Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.
Severity ?
5 (Medium)
CWE
- CWE-256 - Plaintext Storage of a Password
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| canonical | mysql-k8s-operator |
Affected:
< rev221
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-24375",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T15:54:52.264718Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T15:55:01.617Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "mysql-k8s-operator",
"vendor": "canonical",
"versions": [
{
"status": "affected",
"version": "\u003c rev221"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-256",
"description": "CWE-256: Plaintext Storage of a Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-09T22:21:37.858Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v-7694-2hf7",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v-7694-2hf7"
},
{
"name": "https://github.com/canonical/mysql-k8s-operator/pull/553",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/canonical/mysql-k8s-operator/pull/553"
},
{
"name": "https://github.com/canonical/mysql-operator/pull/579",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/canonical/mysql-operator/pull/579"
},
{
"name": "https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f413c5e63216e742a71a1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f413c5e63216e742a71a1"
},
{
"name": "https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e"
}
],
"source": {
"advisory": "GHSA-g83v-7694-2hf7",
"discovery": "UNKNOWN"
},
"title": "MySQL K8s charm could leak credentials for root-level user `serverconfig`"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-24375",
"datePublished": "2025-04-09T22:21:37.858Z",
"dateReserved": "2025-01-20T15:18:26.992Z",
"dateUpdated": "2025-04-10T15:55:01.617Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-24375\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-04-09T23:15:37.513\",\"lastModified\":\"2025-04-11T15:40:10.277\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.\"},{\"lang\":\"es\",\"value\":\"El operador Charmed MySQL K8s es un operador Charmed para ejecutar MySQL en Kubernetes. Antes de la revisi\u00f3n 221, el m\u00e9todo para llamar a un DDL de SQL o a scripts de MySQL-Shell basados en Python pod\u00edan filtrar las credenciales de los usuarios de la base de datos. El m\u00e9todo mysql-operator llama a la aplicaci\u00f3n mysql-shell y se basa en escribir en un archivo de script temporal que contiene la URI completa, con el usuario y la contrase\u00f1a. creado con permisos de lectura (0x644). En otros casos, al llamar al cli de mysql, para un caso espec\u00edfico al crear el operador users, el DDL contiene las credenciales de dicho usuario, las cuales pueden filtrarse a trav\u00e9s del mismo mecanismo de un archivo temporal. Todas las versiones anteriores a la revisi\u00f3n 221 para Kubernetes y la revisi\u00f3n 338 para operadores de m\u00e1quinas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.3,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-256\"}]}],\"references\":[{\"url\":\"https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f413c5e63216e742a71a1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/canonical/mysql-k8s-operator/pull/553\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v-7694-2hf7\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/canonical/mysql-operator/pull/579\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"MySQL K8s charm could leak credentials for root-level user `serverconfig`\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-256\", \"lang\": \"en\", \"description\": \"CWE-256: Plaintext Storage of a Password\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"NONE\", \"baseScore\": 5, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v-7694-2hf7\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v-7694-2hf7\"}, {\"name\": \"https://github.com/canonical/mysql-k8s-operator/pull/553\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/canonical/mysql-k8s-operator/pull/553\"}, {\"name\": \"https://github.com/canonical/mysql-operator/pull/579\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/canonical/mysql-operator/pull/579\"}, {\"name\": \"https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f413c5e63216e742a71a1\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f413c5e63216e742a71a1\"}, {\"name\": \"https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e\"}], \"affected\": [{\"vendor\": \"canonical\", \"product\": \"mysql-k8s-operator\", \"versions\": [{\"version\": \"\u003c rev221\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-04-09T22:21:37.858Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.\"}], \"source\": {\"advisory\": \"GHSA-g83v-7694-2hf7\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24375\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-10T15:54:52.264718Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-10T15:54:56.924Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-24375\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-01-20T15:18:26.992Z\", \"datePublished\": \"2025-04-09T22:21:37.858Z\", \"dateUpdated\": \"2025-04-10T15:55:01.617Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…