A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster.
TrustyAI is creating a role trustyai-service-operator-lmeval-user-role and a CRB trustyai-service-operator-default-lmeval-user-rolebinding which is being applied to system:authenticated making it so that every single user or service account can get a list of pods running in any namespace on the cluster
Additionally users can access all persistentvolumeclaims and lmevaljobs
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Red Hat OpenShift AI 3.0 | RedHat | rhoai/odh-trustyai-service-operator-rhel9:sha256:d4fae05531a06016112624e40f9a4b8bb374495d665206c5a325f80f78781746 | * |