Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8562

Опубликовано: 01 фев. 2022
Источник: nvd
CVSS3: 2.2
CVSS3: 3.1
CVSS2: 3.5
EPSS Низкий

Описание

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Версия до 1.18.18 (включая)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Версия от 1.19.0 (включая) до 1.19.10 (включая)
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Версия от 1.20.0 (включая) до 1.20.6 (включая)
cpe:2.3:a:kubernetes:kubernetes:1.21.0:*:*:*:*:*:*:*

EPSS

Процентиль: 14%
0.00046
Низкий

2.2 Low

CVSS3

3.1 Low

CVSS3

3.5 Low

CVSS2

Дефекты

CWE-367
CWE-367

Связанные уязвимости

CVSS3: 2.2
ubuntu
больше 3 лет назад

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.

CVSS3: 2.2
redhat
около 4 лет назад

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.

CVSS3: 2.2
debian
больше 3 лет назад

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes att ...

CVSS3: 3.1
github
больше 3 лет назад

Potential proxy IP restriction bypass in Kubernetes

EPSS

Процентиль: 14%
0.00046
Низкий

2.2 Low

CVSS3

3.1 Low

CVSS3

3.5 Low

CVSS2

Дефекты

CWE-367
CWE-367