CVE-2025-24375

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24375
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-24375.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-24375
Aliases
  • GHSA-g83v-7694-2hf7
Published
2025-04-09T23:15:37Z
Modified
2025-04-11T16:47:58.637881Z
Summary
[none]
Details

Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.

References

Affected packages

Git / github.com/canonical/mysql-k8s-operator

Affected ranges

Type
GIT
Repo
https://github.com/canonical/mysql-k8s-operator
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/canonical/mysql-operator
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

rev100
rev101
rev102
rev103
rev104
rev105
rev106
rev107
rev108
rev109
rev110
rev111
rev112
rev113
rev114
rev115
rev116
rev117
rev118
rev119
rev120
rev121
rev122
rev123
rev124
rev125
rev126
rev127
rev128
rev129
rev130
rev131
rev132
rev133
rev134
rev135
rev136
rev137
rev138
rev139
rev14
rev140
rev141
rev142
rev143
rev144
rev145
rev146
rev147
rev148
rev149
rev15
rev150
rev151
rev152
rev153
rev154
rev155
rev158
rev159
rev16
rev160
rev161
rev162
rev163
rev164
rev165
rev167
rev168
rev169
rev17
rev170
rev171
rev172
rev173
rev174
rev175
rev176
rev177
rev178
rev179
rev18
rev180
rev181
rev182
rev183
rev184
rev185
rev186
rev187
rev188
rev189
rev19
rev190
rev191
rev192
rev193
rev194
rev195
rev196
rev197
rev198
rev199
rev20
rev200
rev201
rev202
rev203
rev204
rev205
rev206
rev207
rev208
rev209
rev21
rev210
rev211
rev212
rev213
rev214
rev215
rev216
rev217
rev218
rev219
rev22
rev220
rev221
rev222
rev223
rev227
rev228
rev229
rev23
rev230
rev231
rev232
rev234
rev236
rev237
rev238
rev239
rev24
rev240
rev242
rev243
rev245
rev247
rev249
rev25
rev251
rev253
rev255
rev257
rev259
rev26
rev261
rev263
rev264
rev265
rev266
rev267
rev268
rev269
rev27
rev270
rev271
rev272
rev273
rev274
rev275
rev276
rev277
rev278
rev279
rev28
rev280
rev281
rev282
rev283
rev284
rev285
rev286
rev287
rev288
rev289
rev29
rev290
rev291
rev292
rev293
rev294
rev295
rev296
rev297
rev298
rev299
rev30
rev300
rev301
rev302
rev303
rev305
rev306
rev307
rev308
rev31
rev312
rev313
rev314
rev315
rev316
rev317
rev318
rev319
rev32
rev320
rev321
rev322
rev323
rev324
rev325
rev326
rev327
rev328
rev329
rev33
rev330
rev331
rev332
rev333
rev334
rev335
rev336
rev337
rev34
rev35
rev36
rev37
rev38
rev39
rev4
rev40
rev41
rev42
rev43
rev44
rev45
rev46
rev47
rev48
rev49
rev5
rev50
rev51
rev52
rev58
rev60
rev61
rev62
rev63
rev64
rev65
rev66
rev67
rev68
rev69
rev70
rev71
rev72
rev73
rev75
rev76
rev77
rev78
rev79
rev80
rev81
rev82
rev83
rev84
rev85
rev86
rev87
rev88
rev89
rev90
rev91
rev92
rev93
rev94
rev95
rev96
rev97
rev98
rev99