{"id":"CVE-2024-33398","details":"There is a ClusterRole in piraeus-operator v2.5.0 and earlier which has been granted list secrets permission, which allows an attacker to impersonate the service account bound to this ClusterRole and use its high-risk privileges to list confidential information across the cluster.","aliases":["GHSA-6fg2-hvj9-832f","GO-2024-2811"],"modified":"2026-03-15T22:49:28.742207Z","published":"2024-05-03T16:15:11.393Z","references":[{"type":"WEB","url":"https://piraeus.io/"},{"type":"WEB","url":"https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb"},{"type":"PACKAGE","url":"https://github.com/piraeusdatastore/piraeus-operator"},{"type":"PACKAGE","url":"https://github.com/HouqiyuA/k8s-rbac-poc"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-33398.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}