Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8559

Опубликовано: 15 июл. 2020
Источник: redhat
CVSS3: 6.4

Описание

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.

Отчет

Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Hence, this flaw does not affect heketi.

Меры по смягчению последствий

No mitigation is known.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-apiserver-rhel9Not affected
Red Hat Storage 3heketiNot affected
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHSA-2020:536316.12.2020
Red Hat OpenShift Container Platform 4.4openshiftFixedRHSA-2021:003013.01.2021
Red Hat OpenShift Container Platform 4.4openshift4/ose-hyperkubeFixedRHSA-2021:028103.02.2021
Red Hat OpenShift Container Platform 4.5openshift4/ose-hyperkubeFixedRHSA-2020:519401.12.2020
Red Hat OpenShift Container Platform 4.6openshiftFixedRHBA-2020:419727.10.2020
Red Hat OpenShift Container Platform 4.6openshift4/ose-hyperkubeFixedRHSA-2020:429827.10.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=1851422kubernetes: compromised node could escalate to cluster level privileges

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 5 лет назад

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

CVSS3: 6.4
nvd
почти 5 лет назад

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

CVSS3: 6.4
debian
почти 5 лет назад

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions pri ...

CVSS3: 6.8
redos
11 месяцев назад

Уязвимость consul

CVSS3: 6.8
github
около 1 года назад

Privilege Escalation in Kubernetes

6.4 Medium

CVSS3