{"id":"CVE-2024-33394","details":"An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.","aliases":["GHSA-4q63-mr2m-57hf","GO-2024-2816"],"modified":"2026-03-13T07:54:50.010387Z","published":"2024-05-02T18:15:07.523Z","related":["SUSE-SU-2024:2246-1","SUSE-SU-2024:2318-1","openSUSE-SU-2024:14058-1"],"references":[{"type":"ADVISORY","url":"https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kubevirt/kubevirt","events":[{"introduced":"0"},{"last_affected":"f26e45d99ac35743fc33d6a121b629e9a9af6b63"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.2.0"}]}}],"versions":["v0.0.1-alpha.0","v0.0.1-alpha.1","v0.0.1-alpha.2","v0.0.1-alpha.3","v0.0.1-alpha.4","v0.0.1-alpha.5","v0.0.1-alpha.6","v0.0.2","v0.0.3","v0.0.4","v0.1.0","v0.1.0-alpha","v0.10.0","v0.11.0","v0.11.1","v0.12.0","v0.12.0-alpha.0","v0.12.0-alpha.1","v0.12.0-alpha.2","v0.12.0-alpha.3","v0.13.0","v0.14.0","v0.15.0","v0.15.0-alpha.0","v0.16.0","v0.16.0-alpha.0","v0.17.0","v0.17.0-alpha.0","v0.17.0-alpha.1","v0.18.0","v0.19.0","v0.19.0-rc.0","v0.2.0","v0.20.0","v0.21.0","v0.22.0","v0.23.0","v0.24.0","v0.25.0","v0.25.0-rc.0","v0.26.0","v0.26.0-rc.0","v0.26.1","v0.27.0","v0.27.0-rc.0","v0.28.0","v0.28.0-rc.0","v0.28.0-rc.1","v0.28.0-rc.2","v0.29.0","v0.29.0-rc.0","v0.29.0-rc.1","v0.3.0","v0.3.0-alpha.0","v0.3.0-alpha.1","v0.3.0-alpha.2","v0.3.0-alpha.3","v0.3.0-alpha.4","v0.30.0","v0.30.0-rc.0","v0.30.0-rc.1","v0.30.0-rc.2","v0.30.0-rc.3","v0.30.0-rc.4","v0.31.0","v0.31.0-rc.1","v0.32.0-rc.1","v0.33.0-rc.0","v0.34.0-rc.0","v0.35.0","v0.35.0-rc.0","v0.36.0-rc.0","v0.37.0-rc.0","v0.38.0","v0.38.0-rc.0","v0.39.0-rc.0","v0.4.0","v0.4.0-alpha.0","v0.4.0-alpha.1","v0.4.0-alpha.2","v0.4.1","v0.4.1-alpha.1","v0.4.1-alpha.2","v0.40.0-rc.0","v0.41.0-rc.0","v0.42.0","v0.42.0-rc.0","v0.43.0-rc.0","v0.43.1-rc.1","v0.44.0","v0.44.0-rc.0","v0.45.0","v0.45.0-rc.0","v0.46.0","v0.46.0-rc.0","v0.47.0-rc.0","v0.48.0","v0.48.0-rc.0","v0.49.0","v0.49.0-rc.0","v0.5.0","v0.5.0-alpha.0","v0.5.0-alpha.1","v0.5.1-alpha.1","v0.5.1-alpha.2","v0.5.1-alpha.3","v0.50.0","v0.50.0-rc.0","v0.51.0","v0.51.0-rc.0","v0.52.0","v0.52.0-rc.0","v0.53.0","v0.53.0-rc.0","v0.54.0","v0.54.0-rc.0","v0.55.0","v0.55.0-rc.0","v0.56.0-rc.0","v0.57.0","v0.57.0-rc.0","v0.58.0","v0.58.0-rc.0","v0.59.0-alpha.0","v0.59.0-alpha.1","v0.59.0-alpha.2","v0.59.0-rc.0","v0.59.0-rc.1","v0.6.0","v0.6.1","v0.6.1-alpha.0","v0.60.0-alpha.0","v0.7.0","v0.7.0-alpha.0","v0.7.0-alpha.1","v0.7.0-alpha.2","v0.7.0-alpha.3","v0.7.0-alpha.4","v0.7.0-alpha.5","v0.8.0","v0.8.0-alpha.0","v0.8.0-alpha.1","v0.8.0-alpha.2","v0.9.0","v0.9.0-alpha.0","v0.9.0-alpha.1","v0.9.1","v0.9.2","v0.9.3","v1.0.0-alpha.0","v1.0.0-beta.0","v1.1.0-alpha.0","v1.1.0-rc.0","v1.2.0","v1.2.0-alpha.0","v1.2.0-beta.0","v1.2.0-rc.0","v1.2.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-33394.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}