Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8558

Опубликовано: 08 июл. 2020
Источник: redhat
CVSS3: 5.4
EPSS Средний

Описание

The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.

A flaw was found in Kubernetes that allows attackers on adjacent networks to reach services exposed on localhost ports, previously thought to be unreachable. This flaw allows an attacker to gain privileges or access confidential information for any services listening on localhost ports that are not protected by authentication.

Отчет

OpenShift Container Platform does not expose the API server on a localhost port without authentication. The only service exposed on a localhost port not protected by authentication is Metrics, which exposes some cluster metadata.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Storage 3heketiNot affected
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHSA-2020:299227.07.2020
Red Hat OpenShift Container Platform 4.3openshiftFixedRHSA-2020:318305.08.2020
Red Hat OpenShift Container Platform 4.3openshift4/ose-hyperkubeFixedRHSA-2020:318405.08.2020
Red Hat OpenShift Container Platform 4.4openshift4/ose-hyperkubeFixedRHSA-2020:292621.07.2020
Red Hat OpenShift Container Platform 4.4openshiftFixedRHSA-2020:292721.07.2020
Red Hat OpenShift Container Platform 4.5openshift4/ose-hyperkubeFixedRHSA-2020:241213.07.2020
Red Hat OpenShift Container Platform 4.5openshiftFixedRHSA-2020:241313.07.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1843358kubernetes: node localhost services reachable via martian packets

EPSS

Процентиль: 96%
0.24176
Средний

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
около 5 лет назад

The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.

CVSS3: 5.4
nvd
около 5 лет назад

The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.

CVSS3: 5.4
debian
около 5 лет назад

The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17. ...

CVSS3: 8.8
github
больше 3 лет назад

Improper Authentication in Kubernetes

EPSS

Процентиль: 96%
0.24176
Средний

5.4 Medium

CVSS3