Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5465-xc2j-6p84

Опубликовано: 26 янв. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

github.com/openshift/apiserver-library-go Improper Input Validation vulnerability

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

Пакеты

Наименование

github.com/openshift/apiserver-library-go

go
Затронутые версииВерсия исправления

< 0.0.0-20230120221150-cefee9e0162b

0.0.0-20230120221150-cefee9e0162b

EPSS

Процентиль: 25%
0.00086
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 6.3
redhat
около 3 лет назад

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
nvd
около 3 лет назад

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

EPSS

Процентиль: 25%
0.00086
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-20