Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-42363
HistoryAug 20, 2024 - 8:20 p.m.

CVE-2024-42363 GHSL-2023-136_Samson

2024-08-2020:20:03
CWE-502
GitHub_M
www.cve.org
4
kubernetes
user-controlled role
remote code execution
yaml deserialization

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

10.9%

Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.

CNA Affected

[
  {
    "vendor": "Zendesk",
    "product": "Samson",
    "versions": [
      {
        "version": "< 3385",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

10.9%

Related for CVELIST:CVE-2024-42363