Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1002100

Опубликовано: 15 июн. 2017
Источник: redhat
CVSS3: 6.5

Описание

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7kubernetesNot affected
Red Hat OpenShift Enterprise 3kubernetesWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1492101kubernetes: Incorrect default access permissions for Persistent Volumes

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
почти 8 лет назад

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

CVSS3: 6.5
debian
почти 8 лет назад

Default access permissions for Persistent Volumes (PVs) created by the ...

CVSS3: 6.5
github
около 3 лет назад

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

6.5 Medium

CVSS3