CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
97.2%
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API serverโs TLS credentials used to establish the backend connection.
Vendor | Product | Version | CPE |
---|---|---|---|
kubernetes | kubernetes | * | cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* |
kubernetes | kubernetes | 1.9.12 | cpe:2.3:a:kubernetes:kubernetes:1.9.12:beta0:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.2 | cpe:2.3:a:redhat:openshift_container_platform:3.2:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.3 | cpe:2.3:a:redhat:openshift_container_platform:3.3:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.4 | cpe:2.3:a:redhat:openshift_container_platform:3.4:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.5 | cpe:2.3:a:redhat:openshift_container_platform:3.5:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.6 | cpe:2.3:a:redhat:openshift_container_platform:3.6:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.8 | cpe:2.3:a:redhat:openshift_container_platform:3.8:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.10 | cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 3.11 | cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
www.openwall.com/lists/oss-security/2019/06/28/2
www.openwall.com/lists/oss-security/2019/07/06/3
www.openwall.com/lists/oss-security/2019/07/06/4
www.securityfocus.com/bid/106068
access.redhat.com/errata/RHSA-2018:3537
access.redhat.com/errata/RHSA-2018:3549
access.redhat.com/errata/RHSA-2018:3551
access.redhat.com/errata/RHSA-2018:3598
access.redhat.com/errata/RHSA-2018:3624
access.redhat.com/errata/RHSA-2018:3742
access.redhat.com/errata/RHSA-2018:3752
access.redhat.com/errata/RHSA-2018:3754
github.com/evict/poc_CVE-2018-1002105
github.com/kubernetes/kubernetes/issues/71411
groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88
security.netapp.com/advisory/ntap-20190416-0001/
www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do
www.exploit-db.com/exploits/46052/
www.exploit-db.com/exploits/46053/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
97.2%