Lucene search

K
githubGitHub Advisory DatabaseGHSA-R6CC-7WJ7-GFX2
HistoryNov 03, 2023 - 6:30 p.m.

Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation

2023-11-0318:30:24
CWE-20
GitHub Advisory Database
github.com
22
kubernetes
privilege escalation
input validation
windows nodes
admin privileges
software

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

26.8%

Kubernetes is vulnerable to privilege escalation when a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.

Affected configurations

Vulners
Node
kubernetescsi_proxyRange1.1.2
OR
kubernetescsi_proxyMatch2.0.0-alpha.0
VendorProductVersionCPE
kubernetescsi_proxy*cpe:2.3:a:kubernetes:csi_proxy:*:*:*:*:*:*:*:*
kubernetescsi_proxy2.0.0-alpha.0cpe:2.3:a:kubernetes:csi_proxy:2.0.0-alpha.0:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

26.8%