Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"
Kubernetes

Kubernetesоткрытое программное обеспечение для оркестровки контейнеризированных приложений — автоматизации их развёртывания, масштабирования и координации в условиях кластера.

Релизный цикл, информация об уязвимостях

Продукт: Kubernetes
Вендор: kubernetes

График релизов

1.301.311.321.332024202520262027

Недавние уязвимости Kubernetes

Количество 318

debian логотип

CVE-2019-11248

почти 6 лет назад

The debugging endpoint /debug/pprof is exposed over the unauthenticate ...

CVSS3: 8.2
EPSS: Критический
nvd логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-sc ...

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2019-11246

почти 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.12.9, versions prior to 1.13.6, versions prior to 1.14.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-11246

почти 6 лет назад

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-11245

почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
EPSS: Низкий
debian логотип

CVE-2019-11245

почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specif ...

CVSS3: 4.9
EPSS: Низкий
ubuntu логотип

CVE-2019-11245

почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
EPSS: Низкий
ubuntu логотип

CVE-2019-11246

почти 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.12.9, versions prior to 1.13.6, versions prior to 1.14.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11.

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-11248

почти 6 лет назад

The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.

CVSS3: 8.2
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2019-11248

The debugging endpoint /debug/pprof is exposed over the unauthenticate ...

CVSS3: 8.2
91%
Критический
почти 6 лет назад
nvd логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-sc ...

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-11246

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.12.9, versions prior to 1.13.6, versions prior to 1.14.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-11246

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-11245

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-11245

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specif ...

CVSS3: 4.9
0%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-11245

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
0%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-11246

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.12.9, versions prior to 1.13.6, versions prior to 1.14.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-11248

The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.

CVSS3: 8.2
91%
Критический
почти 6 лет назад

Уязвимостей на страницу


Поделиться