Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2025-24375 First vendor Publication 2025-04-09
Vendor Cve Last vendor Modification 2025-04-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24375

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-256 Plaintext Storage of a Password

Sources (Detail)

https://github.com/canonical/mysql-k8s-operator/commit/7c6b1206fcbc7324b72f41...
https://github.com/canonical/mysql-k8s-operator/pull/553
https://github.com/canonical/mysql-k8s-operator/security/advisories/GHSA-g83v...
https://github.com/canonical/mysql-operator/commit/1fb61c1ee3e396cdce13d5e815...
https://github.com/canonical/mysql-operator/pull/579
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:55:53
  • First insertion