Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1002102

Опубликовано: 05 дек. 2019
Источник: debian
EPSS Низкий

Описание

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kubernetesfixed1.17.4-1package

Примечания

  • https://github.com/kubernetes/kubernetes/issues/85867

EPSS

Процентиль: 51%
0.00283
Низкий

Связанные уязвимости

CVSS3: 2.6
ubuntu
больше 5 лет назад

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.

CVSS3: 2.6
redhat
больше 5 лет назад

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.

CVSS3: 2.6
nvd
больше 5 лет назад

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.

EPSS

Процентиль: 51%
0.00283
Низкий