Lucene search

K
githubGitHub Advisory DatabaseGHSA-MGWR-H7MV-FH29
HistoryAug 29, 2024 - 6:00 p.m.

Hwameistor Potential Permission Leakage of Cluster Level

2024-08-2918:00:45
CWE-200
CWE-266
GitHub Advisory Database
github.com
2
permission leakage
cluster level
vulnerability
impact
patches
workarounds
security-role
github
user reports

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

5.1%

Impact

What kind of vulnerability is it? Who is impacted?
This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor’s deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation.

Patches

Has the problem been patched? What versions should users upgrade to?
>= v0.14.6

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?
Update and Limit the ClusterRole using security-role.

References

Are there any links users can visit to find out more?
issues:
https://github.com/hwameistor/hwameistor/issues/1457
https://github.com/hwameistor/hwameistor/issues/1460

also reported by users via mails:
sparkEchooo, younaman

Affected configurations

Vulners
Node
hwameistorhwameistorRange0.14.5
VendorProductVersionCPE
hwameistorhwameistor*cpe:2.3:a:hwameistor:hwameistor:*:*:*:*:*:*:*:*

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

5.1%

Related for GHSA-MGWR-H7MV-FH29