cve-2019-11248
Vulnerability from cvelistv5
Published
2019-08-29 00:26
Modified
2024-09-17 03:28
Severity ?
EPSS score ?
Summary
Kubernetes kubelet exposes /debug/pprof info on healthz port
References
▼ | URL | Tags | |
---|---|---|---|
jordan@liggitt.net | https://github.com/kubernetes/kubernetes/issues/81023 | Patch, Third Party Advisory | |
jordan@liggitt.net | https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ | Mailing List, Third Party Advisory | |
jordan@liggitt.net | https://security.netapp.com/advisory/ntap-20190919-0003/ | Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Kubernetes | Kubernetes |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:09.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kubernetes/kubernetes/issues/81023" }, { "name": "CVE-2019-11248: /debug/pprof exposed on kubelet\u0027s healthz port", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190919-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kubernetes", "vendor": "Kubernetes", "versions": [ { "status": "affected", "version": "prior to 1.12.10" }, { "status": "affected", "version": "prior to 1.13.8" }, { "status": "affected", "version": "prior to 1.14.4" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.4" }, { "status": "affected", "version": "1.5" }, { "status": "affected", "version": "1.6" }, { "status": "affected", "version": "1.7" }, { "status": "affected", "version": "1.8" }, { "status": "affected", "version": "1.9" }, { "status": "affected", "version": "1.10" }, { "status": "affected", "version": "1.11" } ] } ], "credits": [ { "lang": "en", "value": "Jordan Zebor, F5 Networks" } ], "datePublic": "2019-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet\u0027s healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-419", "description": "CWE-419: Unprotected Primary Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-19T16:06:08", "orgId": "a6081bf6-c852-4425-ad4f-a67919267565", "shortName": "kubernetes" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kubernetes/kubernetes/issues/81023" }, { "name": "CVE-2019-11248: /debug/pprof exposed on kubelet\u0027s healthz port", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190919-0003/" } ], "source": { "defect": [ "https://github.com/kubernetes/kubernetes/issues/81023" ], "discovery": "USER" }, "title": "Kubernetes kubelet exposes /debug/pprof info on healthz port", "workarounds": [ { "lang": "en", "value": "update node configurations to set the \"healthzBindAddress\" to \"127.0.0.1\" to prevent access by remote callers." } ], "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "security@kubernetes.io", "DATE_PUBLIC": "2019-08-06", "ID": "CVE-2019-11248", "STATE": "PUBLIC", "TITLE": "Kubernetes kubelet exposes /debug/pprof info on healthz port" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_value": "prior to 1.12.10" }, { "version_value": "prior to 1.13.8" }, { "version_value": "prior to 1.14.4" }, { "version_value": "1.1" }, { "version_value": "1.2" }, { "version_value": "1.4" }, { "version_value": "1.4" }, { "version_value": "1.5" }, { "version_value": "1.6" }, { "version_value": "1.7" }, { "version_value": "1.8" }, { "version_value": "1.9" }, { "version_value": "1.10" }, { "version_value": "1.11" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "configuration": [], "credit": [ { "lang": "eng", "value": "Jordan Zebor, F5 Networks" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet\u0027s healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration." } ] }, "exploit": [], "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-419: Unprotected Primary Channel" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/issues/81023", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/81023" }, { "name": "CVE-2019-11248: /debug/pprof exposed on kubelet\u0027s healthz port", "refsource": "MLIST", "url": "https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ" }, { "name": "https://security.netapp.com/advisory/ntap-20190919-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190919-0003/" } ] }, "solution": [], "source": { "advisory": "", "defect": [ "https://github.com/kubernetes/kubernetes/issues/81023" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "update node configurations to set the \"healthzBindAddress\" to \"127.0.0.1\" to prevent access by remote callers." } ] } } }, "cveMetadata": { "assignerOrgId": "a6081bf6-c852-4425-ad4f-a67919267565", "assignerShortName": "kubernetes", "cveId": "CVE-2019-11248", "datePublished": "2019-08-29T00:26:08.867578Z", "dateReserved": "2019-04-17T00:00:00", "dateUpdated": "2024-09-17T03:28:37.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-11248\",\"sourceIdentifier\":\"jordan@liggitt.net\",\"published\":\"2019-08-29T01:15:11.367\",\"lastModified\":\"2020-10-05T13:50:49.213\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet\u0027s healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\"},{\"lang\":\"es\",\"value\":\"El extremo de depuraci\u00f3n /debug/pprof se expone a trav\u00e9s del puerto de salud de Kubelet no autenticado. El punto final del pprof go se expone sobre el puerto healthz del Kubelet. Este extremo de depuraci\u00f3n puede filtrar informaci\u00f3n confidencial, como las direcciones internas de memoria y la configuraci\u00f3n de Kubelet, o por una denegaci\u00f3n de servicio limitada. Las versiones anteriores a 1.15.0, 1.14.4, 1.13.8 y 1.12.10 se ven afectadas. El problema es de gravedad media, pero no expuesto por la configuraci\u00f3n predeterminada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}],\"cvssMetricV30\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-419\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.12.10\",\"matchCriteriaId\":\"EF491B76-31AF-401F-BDCA-2B825BD00B18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46561812-D492-4752-B461-726CB59ACF20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A873E8-B8AA-4F44-B7D5-25F4C40CCA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F708C4D8-12E6-4CBC-8ECD-A5F0F5EFDA39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9EC2A9-1C77-4701-8F93-8000FF716AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CBA108A-AE8C-4C6D-AEDC-22B628FAC588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"F82D886D-F427-45D1-B39B-51D7C1945AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E0AE58-9B46-4404-B83E-41A0AD5A4CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"579E840C-9FE1-4843-B93F-16D64D19A4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0A3812-0619-4D6C-8192-96BDE9DBC809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AD34AC-D1CB-4E37-B570-C902F6033D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69FEB72-F836-4AE3-99BB-3237A9011089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.1:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BD120EE-6A09-46FC-B6EB-40CD44B54450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1F6346-9C0B-4916-9FEF-9CFB1A19F977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.2:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"06674061-F269-4176-8A4B-6FF9D3E8A5B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEEE7CFF-9B3E-4B76-AFF6-18626060F46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.3:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"028EB2D3-3490-4D12-B2E4-C330B015F0E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B34DB5C-F1C0-42E3-A3E8-300C2E87FE04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.4:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"471B216A-3B92-4033-8E06-8523EA167132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E81600-D293-4B9B-BDB6-4057308A7876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.5:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"59EA6211-D671-42EC-BEAE-698CB47FD529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DA1071A-7489-45B5-875C-D3F8401BC726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC774DD-08F0-4AC4-A0A9-67F86A7ED2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE36DCA-CBFD-4536-9760-5B6BEF1FFDAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.7:beta.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE75E512-849E-4153-A469-EB271DB58F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.13.8:beta.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEF4BDF-5189-4FD9-8037-DD15E147F611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"428B51D5-37DA-4C4D-A4BF-09F8CAB04A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A6AC2D-82C4-4E1F-8D9A-159E31A4F790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"002991E8-6CC8-4F58-89B3-0B1AF2447DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EA02FED-0377-4E4B-A86F-EE44F0E27360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1496A02B-29F5-4DD5-B9FE-B39C5B77E8CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D7C9A1-A467-46A5-A03E-A04BD35287C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BF2E7F-E6DB-4ED0-B943-247B4F592C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF0406C1-854E-4B4D-AC1E-7DE304356030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"300E9B49-446B-406C-B219-360BD97D6EC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AEA05A4-1B15-4E86-AD77-9D0BC1822AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.1:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7A10F0-A32E-4B56-8706-F09CE7914557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"149679C2-2A81-4783-8CFD-13DC0FD5BE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.2:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB97EBDA-CC98-4D92-B3F9-1BFBB21898B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBB6E83-04DF-4B19-B638-F1F3183BE8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.3:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EB704F-AA52-4308-9451-9700EAB596F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.4:beta.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72214C5-AA44-4937-A42A-C2FD1E0EF7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"B87B49B8-1441-45B6-9A72-E3C5A278883D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A14876D-D0FA-4883-AEC6-28E29F5E3CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"401E0997-C67F-471C-B596-92B9773A3AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1B7B10-AC15-4022-BDC9-71CF82130E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"550C5D3B-2C70-4411-A54D-3D07EAEFD7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE430085-EA45-43B6-8AF2-30AD462D0F69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5652A16C-F032-4FC0-BFEC-04768D259470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.15.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"874991D0-5C48-4D10-B2E4-51D6BE2298E4\"}]}]}],\"references\":[{\"url\":\"https://github.com/kubernetes/kubernetes/issues/81023\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/d/msg/kubernetes-security-announce/pKELclHIov8/BEDtRELACQAJ\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190919-0003/\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.