Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fp37-c92q-4pwq

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Kubernetes kube-apiserver unauthorized access

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

Пакеты

Наименование

k8s.io/apiextensions-apiserver

go
Затронутые версииВерсия исправления

>= 0.7.0, < 0.13.9

0.13.9

Наименование

k8s.io/apiextensions-apiserver

go
Затронутые версииВерсия исправления

>= 0.14.0, < 0.14.5

0.14.5

Наименование

k8s.io/apiextensions-apiserver

go
Затронутые версииВерсия исправления

>= 0.15.0, < 0.15.2

0.15.2

EPSS

Процентиль: 63%
0.00447
Низкий

8.1 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 5
redhat
почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
nvd
почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
debian
почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-sc ...

oracle-oval
больше 5 лет назад

ELSA-2019-4816: kubernetes security update (IMPORTANT)

EPSS

Процентиль: 63%
0.00447
Низкий

8.1 High

CVSS3

Дефекты

CWE-863