Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qjvc-p88j-j9rm

Опубликовано: 29 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Kyverno's PolicyException objects can be created in any namespace by default

Summary

A kyverno ClusterPolicy, ie. "disallow-privileged-containers," can be overridden by the creation of a PolicyException in a random namespace.

Details

By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions.

PoC

  1. Administrator creates "disallow-privileged-containers" ClusterPolicy that applies to resources in the namespace "ubuntu-restricted"
  2. Cluster user creates a PolicyException object for "disallow-privileged-containers" in namespace "ubuntu-restricted"
  3. Cluster user creates a pod with a privileged container in "ubuntu-restricted"
  4. Cluster user escalates to root on the node from the privileged container

Impact

Administrators attempting to enforce cluster security through kyverno policies, but that allow less privileged users to create resources

Пакеты

Наименование

github.com/kyverno/kyverno

go
Затронутые версииВерсия исправления

< 1.13.0

1.13.0

EPSS

Процентиль: 55%
0.00325
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-285
CWE-863

Связанные уязвимости

CVSS3: 2.7
nvd
больше 1 года назад

Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. "disallow-privileged-containers," can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0.

suse-cvrf
больше 1 года назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 55%
0.00325
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-285
CWE-863