Логотип exploitDog
bind:"CVE-2022-3294"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-3294"

Количество 12

Количество 12

ubuntu логотип

CVE-2022-3294

больше 2 лет назад

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2022-3294

почти 3 года назад

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2022-3294

больше 2 лет назад

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 6.6
EPSS: Низкий
msrc логотип

CVE-2022-3294

около 1 месяца назад

Node address isn't always verified when proxying

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2022-3294

больше 2 лет назад

Users may have access to secure endpoints in the control plane network ...

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-jh36-q97c-9928

больше 2 лет назад

Kubernetes vulnerable to validation bypass

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-06756

почти 3 года назад

Уязвимость Kube API-сервера программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю выполнить произвольные запросы

CVSS3: 6.6
EPSS: Низкий
oracle-oval логотип

ELSA-2022-10036

почти 3 года назад

ELSA-2022-10036: kubernetes security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-10035

почти 3 года назад

ELSA-2022-10035: kubernetes security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-10034

почти 3 года назад

ELSA-2022-10034: kubernetes security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-10033

почти 3 года назад

ELSA-2022-10033: kubernetes security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2292-1

больше 2 лет назад

Security update for kubernetes1.23

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3294

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 6.6
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-3294

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 8.8
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-3294

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.

CVSS3: 6.6
1%
Низкий
больше 2 лет назад
msrc логотип
CVE-2022-3294

Node address isn't always verified when proxying

CVSS3: 6.6
1%
Низкий
около 1 месяца назад
debian логотип
CVE-2022-3294

Users may have access to secure endpoints in the control plane network ...

CVSS3: 6.6
1%
Низкий
больше 2 лет назад
github логотип
GHSA-jh36-q97c-9928

Kubernetes vulnerable to validation bypass

CVSS3: 8.8
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2022-06756

Уязвимость Kube API-сервера программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю выполнить произвольные запросы

CVSS3: 6.6
1%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2022-10036

ELSA-2022-10036: kubernetes security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2022-10035

ELSA-2022-10035: kubernetes security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2022-10034

ELSA-2022-10034: kubernetes security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2022-10033

ELSA-2022-10033: kubernetes security update (IMPORTANT)

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2292-1

Security update for kubernetes1.23

больше 2 лет назад

Уязвимостей на страницу