Описание
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Ссылки
- Issue TrackingMitigationThird Party Advisory
- Issue TrackingMitigationThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
2.6 Low
CVSS3
2.1 Low
CVSS2
Дефекты
Связанные уязвимости
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Improper validation of URL redirection in the Kubernetes API server in ...
EPSS
2.6 Low
CVSS3
2.1 Low
CVSS2