Логотип exploitDog
bind:CVE-2023-1260
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1260

Количество 3

Количество 3

redhat логотип

CVE-2023-1260

почти 3 года назад

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

CVSS3: 8
EPSS: Низкий
nvd логотип

CVE-2023-1260

больше 2 лет назад

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-92hx-3mh6-hc49

больше 2 лет назад

kube-apiserver authentication bypass vulnerability

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-1260

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

CVSS3: 8
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-1260

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

CVSS3: 8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-92hx-3mh6-hc49

kube-apiserver authentication bypass vulnerability

CVSS3: 8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу