Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mgwr-h7mv-fh29

Опубликовано: 29 авг. 2024
Источник: github
Github: Прошло ревью
CVSS4: 4.6
CVSS3: 2.3

Описание

Hwameistor Potential Permission Leakage of Cluster Level

Impact

What kind of vulnerability is it? Who is impacted? This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation.

Patches

Has the problem been patched? What versions should users upgrade to?

= v0.14.6

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading? Update and Limit the ClusterRole using security-role.

References

Are there any links users can visit to find out more? issues: https://github.com/hwameistor/hwameistor/issues/1457 https://github.com/hwameistor/hwameistor/issues/1460

also reported by users via mails: sparkEchooo, younaman

Пакеты

Наименование

github.com/hwameistor/hwameistor

go
Затронутые версииВерсия исправления

<= 0.14.5

0.14.6

EPSS

Процентиль: 18%
0.00058
Низкий

4.6 Medium

CVSS4

2.3 Low

CVSS3

Дефекты

CWE-200
CWE-266

Связанные уязвимости

CVSS3: 2.8
nvd
больше 1 года назад

Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role.

EPSS

Процентиль: 18%
0.00058
Низкий

4.6 Medium

CVSS4

2.3 Low

CVSS3

Дефекты

CWE-200
CWE-266