Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0759

Опубликовано: 25 мар. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-kubeclientfixed4.9.3-1package
ruby-kubeclientno-dsabullseyepackage
ruby-kubeclientno-dsabusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2058404

  • https://github.com/ManageIQ/kubeclient/issues/554

  • https://github.com/ManageIQ/kubeclient/pull/556

  • https://github.com/ManageIQ/kubeclient/issues/555

  • https://github.com/ManageIQ/kubeclient/pull/556

EPSS

Процентиль: 34%
0.00137
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.3
redhat
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.1
nvd
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.1
github
почти 4 года назад

Improper Certificate Validation in kubeclient

CVSS3: 8.3
fstec
почти 4 года назад

Уязвимость реализации класса Kubeclient::Configе клиента REST API Kubernetes kubeclient, позволяющая нарушителю выполнить атаку типа «человек посередине»

EPSS

Процентиль: 34%
0.00137
Низкий