Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4hc4-pgfx-3mrx

Опубликовано: 17 мар. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.4

Описание

cilium-agent container can access the host via hostPath mount

Impact

An attacker with access to a Cilium agent pod can write to /opt/cni/bin due to a hostPath mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node.

Patches

The issue has been fixed and is available on versions >=1.11.15, >=1.12.8, >=1.13.1.

Workarounds

Kubernetes RBAC should be used to deny users and service accounts exec access to Cilium agent pods.

In cases where a user requires exec access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.

References

Acknowledgements

The Cilium community has worked together with members of Isovalent and Form3 to prepare these mitigations. Special thanks to Anastasios Koutlis, Daniel Teixeira, and Magdalena Oczadly for their cooperation.

For more information

If you have any questions or comments about this advisory, please reach out on Slack.

As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: security@cilium.io - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.

Пакеты

Наименование

github.com/cilium/cilium

go
Затронутые версииВерсия исправления

< 1.11.15

1.11.15

Наименование

github.com/cilium/cilium

go
Затронутые версииВерсия исправления

>= 1.12.0, < 1.12.8

1.12.8

Наименование

github.com/cilium/cilium

go
Затронутые версииВерсия исправления

>= 1.13.0, < 1.13.1

1.13.1

EPSS

Процентиль: 2%
0.00015
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 4.4
nvd
почти 3 года назад

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, an attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node. The issue has been fixed and the fix is available on versions 1.11.15, 1.12.8, and 1.13.1. Some workarounds are available. Kubernetes RBAC should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.

CVSS3: 4.4
debian
почти 3 года назад

Cilium is a networking, observability, and security solution with an e ...

EPSS

Процентиль: 2%
0.00015
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-276