Gardener External DNS Management allows malicious google credential in DNS secret to lead to privilege escalation
Critical severity
GitHub Reviewed
Published
May 19, 2025
in
gardener/external-dns-management
•
Updated May 19, 2025
Description
Published by the National Vulnerability Database
May 19, 2025
Published to the GitHub Advisory Database
May 19, 2025
Reviewed
May 19, 2025
Last updated
May 19, 2025
A security vulnerability was discovered in Gardener that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed.
Am I Vulnerable?
This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters.
Affected Components
gardener/external-dns-management
Affected Versions
Fixed Versions
Important
The
external-dns-management
component may also be deployed on the seeds by the https://github.com/gardener/gardener-extension-shoot-dns-service extension when the extension is enabled. In this case, all versions of theshoot-dns-service
extension<= v1.60.0
are affected by this vulnerability.How do I mitigate this vulnerability?
Update to a fixed version.
References