We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24375

MySQL K8s charm could leak credentials for root-level user `serverconfig`



Description

Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.

Reserved 2025-01-20 | Published 2025-04-09 | Updated 2025-04-10 | Assigner GitHub_M


MEDIUM: 5.0CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-256: Plaintext Storage of a Password

Product status

< rev221
affected

References

github.com/...erator/security/advisories/GHSA-g83v-7694-2hf7

github.com/canonical/mysql-k8s-operator/pull/553

github.com/canonical/mysql-operator/pull/579

github.com/...ommit/7c6b1206fcbc7324b72f413c5e63216e742a71a1

github.com/...ommit/1fb61c1ee3e396cdce13d5e8155f2f32a860f89e

cve.org (CVE-2025-24375)

nvd.nist.gov (CVE-2025-24375)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-24375

Support options

Helpdesk Chat, Email, Knowledgebase