Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8566

Опубликовано: 14 окт. 2020
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

A flaw was found in kubernetes. If the logging level is to at least 4, and Ceph RBD is configured as a storage provisioner, then Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims.

Отчет

OpenShift Container Platform 4 does not support Ceph RBD persistent volumes, however the vulnerable code is included.

Меры по смягчению последствий

OCP Clusters not using Ceph RBD volumes are not vulnerable to this issue. For clusters using Ceph RBD volumes, this can be mitigated by ensuring the logging level is below 4 and protecting unauthorized access to cluster logs. For OCP, the logging level for core components can be configured using operators, e.g. for kube-controller-manager: https://docs.openshift.com/container-platform/latest/rest_api/operator_apis/kubecontrollermanager-operator-openshift-io-v1.html#specification In OCP, a logging level of "Debug" is equivalent to 4: https://github.com/openshift/api/blob/master/operator/v1/types.go#L96 The default logging level is "Normal", which is equivalent to 2. Clusters running with the default level are not vulnerable to this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftWill not fix
Red Hat Storage 3heketiNot affected
Red Hat OpenShift Container Platform 4.6openshift4/ose-hyperkubeFixedRHSA-2021:003718.01.2021
Red Hat OpenShift Container Platform 4.7openshiftFixedRHSA-2020:563424.02.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-117
https://bugzilla.redhat.com/show_bug.cgi?id=1886640kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel >= 4

EPSS

Процентиль: 44%
0.00207
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 4 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
nvd
больше 4 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
debian
больше 4 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with l ...

CVSS3: 5.3
github
около 1 года назад

Sensitive Information leak via Log File in Kubernetes

suse-cvrf
больше 4 лет назад

Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package

EPSS

Процентиль: 44%
0.00207
Низкий

5.3 Medium

CVSS3