Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23551

Опубликовано: 21 дек. 2022
Источник: redhat
CVSS3: 5.3

Описание

aad-pod-identity assigns Azure Active Directory identities to Kubernetes applications and has now been deprecated as of 24 October 2022. The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: /metadata/identity\oauth2\token/) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to. This issue has been fixed and has been included in AAD Pod Identity release version 1.8.13. If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the version 1.8.13 release.

A flaw was found in aad-pod-identity. This issue could allow an attacker to obtain a token when a request is made that includes a backslash, bypassing proper validation and completing the request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-azure-cluster-api-controllers-rhel8Affected
Red Hat OpenShift Container Platform 4openshift4/ose-cluster-capi-operator-container-rhel8Affected
Red Hat OpenShift Container Platform 4openshift4/ose-cluster-capi-rhel8-operatorAffected
Red Hat OpenShift Container Platform 4openshift4/ose-hypershift-rhel9Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=2155904aad-pod-identity: authentication bypass via backslash

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 3 лет назад

aad-pod-identity assigns Azure Active Directory identities to Kubernetes applications and has now been deprecated as of 24 October 2022. The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identity\oauth2\token/`) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to. This issue has been fixed and has been included in AAD Pod Identity release version 1.8.13. If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the version 1.8.13 release.

CVSS3: 5.3
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 5.3
github
около 3 лет назад

AAD Pod Identity obtaining token with backslash

CVSS3: 5.3
fstec
около 3 лет назад

Уязвимость компонента NMI программного средства управления аутентификацией в Kubernetes-кластерах AAD Pod Identity, связанная с обходом токена проверки, позволяющая нарушителю повысить свои привилегии

5.3 Medium

CVSS3