CVE-2023-3361
📋 TL;DR
This vulnerability in Red Hat OpenShift Data Science exposes S3 credentials in plain text when exporting pipelines from the Elyra notebook pipeline editor. Attackers who gain access to exported pipeline files can steal cloud storage credentials. This affects OpenShift Data Science users who export pipelines as Python DSL or YAML.
💻 Affected Systems
- Red Hat OpenShift Data Science
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain S3 credentials leading to data exfiltration, unauthorized data modification, or lateral movement to other cloud resources.
Likely Case
Internal users or attackers with access to exported pipeline files can read sensitive S3 credentials stored in plain text.
If Mitigated
With proper access controls and monitoring, credential exposure is limited to authorized users who already have pipeline access.
🎯 Exploit Status
Exploitation requires access to exported pipeline files. No authentication bypass needed if files are accessible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: OpenShift Data Science 1.28.0 and later
Vendor Advisory: https://access.redhat.com/security/cve/CVE-2023-3361
Restart Required: Yes
Instructions:
1. Update OpenShift Data Science to version 1.28.0 or later. 2. Restart affected components. 3. Verify pipeline exports no longer contain plain text credentials.
🔧 Temporary Workarounds
Disable pipeline exports
allTemporarily disable pipeline export functionality in Elyra notebook pipeline editor
Credential rotation
allRotate all S3 credentials used by OpenShift Data Science pipelines
🧯 If You Can't Patch
- Implement strict access controls on exported pipeline files and storage locations
- Monitor and audit access to exported pipeline files for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Export a pipeline from Elyra notebook pipeline editor as Python DSL or YAML and check if S3 credentials appear in plain text
Check Version:
oc get csv -n redhat-ods-operator | grep rhods-operator
Verify Fix Applied:
After patching, export a pipeline and confirm credentials are replaced with Kubernetes secret references instead of plain text
📡 Detection & Monitoring
Log Indicators:
- Access to exported pipeline files containing credential strings
- Unauthorized access attempts to pipeline export directories
Network Indicators:
- Unusual S3 API calls from unexpected sources using exposed credentials
SIEM Query:
search 'pipeline_export' AND ('s3_access_key' OR 's3_secret_key' OR 'aws_access_key_id' OR 'aws_secret_access_key')
🔗 References
- https://access.redhat.com/security/cve/CVE-2023-3361
- https://bugzilla.redhat.com/show_bug.cgi?id=2216588
- https://github.com/opendatahub-io/odh-dashboard/issues/1415
- https://access.redhat.com/security/cve/CVE-2023-3361
- https://bugzilla.redhat.com/show_bug.cgi?id=2216588
- https://github.com/opendatahub-io/odh-dashboard/issues/1415