Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8554

Опубликовано: 21 янв. 2021
Источник: debian
EPSS Средний

Описание

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kubernetesfixed1.31.4+ds-1package
kubernetesnot-affectedbookwormpackage
kubernetesnot-affectedbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/12/07/5

  • https://github.com/kubernetes/kubernetes/issues/97076

  • Server components no longer built since 1.20.5+really1.20.2-1

EPSS

Процентиль: 96%
0.30412
Средний

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 4 лет назад

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS3: 6.3
redhat
больше 4 лет назад

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS3: 6.3
nvd
больше 4 лет назад

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS3: 5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5
github
больше 3 лет назад

Unverified Ownership in Kubernetes

EPSS

Процентиль: 96%
0.30412
Средний