Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8564

Опубликовано: 07 дек. 2020
Источник: debian
EPSS Низкий

Описание

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kubernetesfixed1.19.3-1package

Примечания

  • https://github.com/kubernetes/kubernetes/pull/94712

  • https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk

  • https://github.com/kubernetes/kubernetes/issues/95622

EPSS

Процентиль: 10%
0.00038
Низкий

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 4 лет назад

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 5.3
redhat
больше 4 лет назад

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
nvd
больше 4 лет назад

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
github
больше 2 лет назад

Kubernetes Sensitive Information leak via Log File

EPSS

Процентиль: 10%
0.00038
Низкий