Lucene search

K
githubGitHub Advisory DatabaseGHSA-2394-5535-8J88
HistoryMar 01, 2023 - 9:30 p.m.

Kubernetes vulnerable to path traversal

2023-03-0121:30:18
CWE-22
CWE-23
GitHub Advisory Database
github.com
16
kubernetes
path traversal
vulnerability
customresourcedefinitions
api group
authorization
cluster-wide
software

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.1%

Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.

Affected configurations

Vulners
Node
kuberneteskubernetesRange1.22.01.22.16
OR
kuberneteskubernetesRange1.23.01.23.14
OR
kuberneteskubernetesRange1.24.01.24.8
OR
kuberneteskubernetesRange1.25.01.25.3
VendorProductVersionCPE
kuberneteskubernetes*cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.1%