Home » Database

AVID-2026-R1244

Description

S3 credentials included when exporting elyra notebook (CVE-2023-3361)

Details

A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.

Reason for inclusion in AVID: The CVE describes a software flaw in Red Hat OpenShift Data Science’s Elyra notebook exporter where S3 credentials are saved in plaintext in exported pipeline definitions. This directly concerns AI pipelines/tools used to build/deploy AI systems, representing a software vulnerability in a component (RHODS/Elyra exporter) that lies in the AI software stack. The exposed credentials pose a security risk (credential leakage) in artifacts that can influence AI workflows, aligning with software supply chain risk considerations for AI systems. Sufficient signal is provided by the CVE description and references.

References

Affected or Relevant Artifacts

  • Developer: n/a, Red Hat
  • Deployer: n/a, Red Hat
  • Artifact Details:
TypeName
Systemodh-dashboard
SystemRed Hat OpenShift Data Science (RHODS)

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Base Score7.7
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-200Exposure of Sensitive Information to an Unauthorized Actor

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-10-04
  • Version: 0.3.3
  • AVID Entry