Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"
Kubernetes

Kubernetesоткрытое программное обеспечение для оркестровки контейнеризированных приложений — автоматизации их развёртывания, масштабирования и координации в условиях кластера.

Релизный цикл, информация об уязвимостях

Продукт: Kubernetes
Вендор: kubernetes

График релизов

1.301.311.321.332024202520262027

Недавние уязвимости Kubernetes

Количество 318

nvd логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, use ...

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
EPSS: Средний
ubuntu логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2019-9946

около 6 лет назад

Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-1002100

больше 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
fstec логотип

BDU:2020-02155

больше 6 лет назад

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Средний
fstec логотип

BDU:2019-00826

больше 6 лет назад

Уязвимость инструмента для запуска изолированных контейнеров runc, связанная с ошибками обработки файлового дескриптора, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.2
EPSS: Средний
fstec логотип

BDU:2019-00822

больше 6 лет назад

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с некорректной обработкой ошибок, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
около 6 лет назад
debian логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, use ...

CVSS3: 6.5
11%
Средний
около 6 лет назад
ubuntu логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
49%
Средний
около 6 лет назад
ubuntu логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
около 6 лет назад
redhat логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 5.3
49%
Средний
около 6 лет назад
redhat логотип
CVE-2019-9946

Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
больше 6 лет назад
fstec логотип
BDU:2020-02155

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
11%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-00826

Уязвимость инструмента для запуска изолированных контейнеров runc, связанная с ошибками обработки файлового дескриптора, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.2
52%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-00822

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с некорректной обработкой ошибок, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
90%
Критический
больше 6 лет назад

Уязвимостей на страницу


Поделиться