Логотип exploitDog
bind:CVE-2024-56513
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-56513

Количество 4

Количество 4

nvd логотип

CVE-2024-56513

около 1 года назад

Karmada is a Kubernetes management system that allows users to run cloud-native applications across multiple Kubernetes clusters and clouds. Prior to version 1.12.0, the PULL mode clusters registered with the `karmadactl register` command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters. Since Karmada v1.12.0, command `karmadactl register` restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada. As a workaround, one may restrict the access permissions of pull mode member clusters to control plane resources according to Karmada Component Permissions Docs.

EPSS: Низкий
github логотип

GHSA-mg7w-c9x2-xh7r

около 1 года назад

Karmada PULL Mode Cluster Privilege Escalation

EPSS: Низкий
fstec логотип

BDU:2025-00077

около 1 года назад

Уязвимость системы управления кластерами Kubernetes для запуска облачных приложения на нескольких кластерах Karmada, связанная с некорректным присваиванием привилегий, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0060-1

около 1 года назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-56513

Karmada is a Kubernetes management system that allows users to run cloud-native applications across multiple Kubernetes clusters and clouds. Prior to version 1.12.0, the PULL mode clusters registered with the `karmadactl register` command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters. Since Karmada v1.12.0, command `karmadactl register` restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada. As a workaround, one may restrict the access permissions of pull mode member clusters to control plane resources according to Karmada Component Permissions Docs.

0%
Низкий
около 1 года назад
github логотип
GHSA-mg7w-c9x2-xh7r

Karmada PULL Mode Cluster Privilege Escalation

0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00077

Уязвимость системы управления кластерами Kubernetes для запуска облачных приложения на нескольких кластерах Karmada, связанная с некорректным присваиванием привилегий, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0060-1

Security update for govulncheck-vulndb

около 1 года назад

Уязвимостей на страницу