Lucene search

K
cveKubernetesCVE-2020-8555
HistoryJun 05, 2020 - 5:15 p.m.

CVE-2020-8555

2020-06-0517:15:11
CWE-918
kubernetes
web.nvd.nist.gov
211
11
cve-2020-8555
kubernetes
ssrf
vulnerability
nvd
security
information leakage
network security

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

41.5%

The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the masterโ€™s host network (such as link-local or loopback services).

Affected configurations

Nvd
Node
kuberneteskubernetesRange<1.15.11
OR
kuberneteskubernetesRange1.16.0โ€“1.16.9
OR
kuberneteskubernetesRange1.17.0โ€“1.17.5
OR
kuberneteskubernetesMatch1.18.0-
Node
fedoraprojectfedoraMatch32
VendorProductVersionCPE
kuberneteskubernetes*cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
kuberneteskubernetes1.18.0cpe:2.3:a:kubernetes:kubernetes:1.18.0:-:*:*:*:*:*:*
fedoraprojectfedora32cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Kubernetes",
    "vendor": "Kubernetes",
    "versions": [
      {
        "status": "affected",
        "version": "1.18.0"
      },
      {
        "status": "affected",
        "version": "1.1"
      },
      {
        "status": "affected",
        "version": "1.2"
      },
      {
        "status": "affected",
        "version": "1.3"
      },
      {
        "status": "affected",
        "version": "1.4"
      },
      {
        "status": "affected",
        "version": "1.5"
      },
      {
        "status": "affected",
        "version": "1.6"
      },
      {
        "status": "affected",
        "version": "1.7"
      },
      {
        "status": "affected",
        "version": "1.8"
      },
      {
        "status": "affected",
        "version": "1.9"
      },
      {
        "status": "affected",
        "version": "1.10"
      },
      {
        "status": "affected",
        "version": "1.11"
      },
      {
        "status": "affected",
        "version": "1.12"
      },
      {
        "status": "affected",
        "version": "1.13"
      },
      {
        "status": "affected",
        "version": "1.14"
      },
      {
        "lessThan": "1.15.12",
        "status": "affected",
        "version": "1.15",
        "versionType": "custom"
      },
      {
        "lessThan": "1.16.9",
        "status": "affected",
        "version": "1.16",
        "versionType": "custom"
      },
      {
        "lessThan": "1.17.5",
        "status": "affected",
        "version": "1.17",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

41.5%