Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1002105

Опубликовано: 05 дек. 2018
Источник: debian
EPSS Высокий

Описание

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kubernetesfixed1.17.4-1package

Примечания

  • https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88

  • https://github.com/kubernetes/kubernetes/issues/71411

EPSS

Процентиль: 100%
0.89863
Высокий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

CVSS3: 9.8
redhat
около 7 лет назад

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

CVSS3: 9.8
nvd
около 7 лет назад

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

CVSS3: 9.8
github
почти 4 года назад

Privilege Escalation in Kubernetes

oracle-oval
около 7 лет назад

ELSA-2018-4303: kubernetes security update (IMPORTANT)

EPSS

Процентиль: 100%
0.89863
Высокий