Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-69p3-xp37-f692

Опубликовано: 26 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Improper Certificate Validation in kubeclient

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

Пакеты

Наименование

kubeclient

rubygems
Затронутые версииВерсия исправления

< 4.9.3

4.9.3

EPSS

Процентиль: 34%
0.00137
Низкий

8.1 High

CVSS3

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.3
redhat
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.1
nvd
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).

CVSS3: 8.1
debian
почти 4 года назад

A flaw was found in all versions of kubeclient up to (but not includin ...

CVSS3: 8.3
fstec
почти 4 года назад

Уязвимость реализации класса Kubeclient::Configе клиента REST API Kubernetes kubeclient, позволяющая нарушителю выполнить атаку типа «человек посередине»

EPSS

Процентиль: 34%
0.00137
Низкий

8.1 High

CVSS3

Дефекты

CWE-295