Bug 2385773 (CVE-2025-8415) - CVE-2025-8415 cryostat: authentication bypass if Network Policies are disabled
Summary: CVE-2025-8415 cryostat: authentication bypass if Network Policies are disabled
Keywords:
Status: NEW
Alias: CVE-2025-8415
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-31 13:46 UTC by OSIDB Bzimport
Modified: 2025-09-03 02:15 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:14919 0 None None None 2025-09-03 02:15:24 UTC

Description OSIDB Bzimport 2025-07-31 13:46:06 UTC
A vulnerability was found in Cryostat HTTP API. Cryostat's HTTP API binds to all network interfaces, allowing possible external visibility to the API port. 


Cryostat's HTTP API binds to 0.0.0.0, potentially  allowing external connections to the API port (8181). The Cryostat container is placed into a Pod with an openshift-oauth-proxy container,  which is designed to hide the Cryostat HTTP API behind HTTPS and OpenShift OAuth authn/authz. The Cryostat API port is not exposed on any Service or Route, so it is not exposed externally to the cluster.

Cryostat release version 4.0.0 also creates Network Policy objects by default which control the network Ingresses. This effectively prevents the exposed API port from being reached by unexpected clients. However, if the underlying cluster network stack does not support Network Policies, or if the user who installed Cryostat configured its Custom Resource to explicitly disable Network Policies, then this layer of protection is ineffective.

Under these conditions, it becomes possible for an attacker within the cluster to determine the internal Pod IP of the Cryostat container and sent HTTP requests directly to its API port, bypassing the openshift-oauth-proxy completely, so no authn/authz is required.

Comment 3 errata-xmlrpc 2025-09-03 02:15:23 UTC
This issue has been addressed in the following products:

  Cryostat 4 on RHEL 9

Via RHSA-2025:14919 https://access.redhat.com/errata/RHSA-2025:14919


Note You need to log in before you can comment on or make changes to this bug.