Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mg7w-c9x2-xh7r

Опубликовано: 03 янв. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Karmada PULL Mode Cluster Privilege Escalation

Impact

What kind of vulnerability is it? Who is impacted?

The PULL mode clusters registered with the karmadactl register command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters.

Patches

Has the problem been patched? What versions should users upgrade to?

Since Karmada v1.12.0, command karmadactl register restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Restricts the access permissions of pull mode member clusters to control plane resources according to Karmada Component Permissions Docs.

References

Are there any links users can visit to find out more?

  1. Enhancements made from the Karmada community: https://github.com/karmada-io/karmada/pull/5793
  2. Karmada Component Permissions: https://karmada.io/docs/administrator/security/component-permission

Пакеты

Наименование

github.com/karmada-io/karmada

go
Затронутые версииВерсия исправления

< 1.12.0

1.12.0

EPSS

Процентиль: 35%
0.00146
Низкий

8.7 High

CVSS4

Дефекты

CWE-266

Связанные уязвимости

nvd
около 1 года назад

Karmada is a Kubernetes management system that allows users to run cloud-native applications across multiple Kubernetes clusters and clouds. Prior to version 1.12.0, the PULL mode clusters registered with the `karmadactl register` command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters. Since Karmada v1.12.0, command `karmadactl register` restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada. As a workaround, one may restrict the access permissions of pull mode member clusters to control plane resources according to Karmada Component Permissions Docs.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость системы управления кластерами Kubernetes для запуска облачных приложения на нескольких кластерах Karmada, связанная с некорректным присваиванием привилегий, позволяющая нарушителю повысить свои привилегии

suse-cvrf
около 1 года назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 35%
0.00146
Низкий

8.7 High

CVSS4

Дефекты

CWE-266