GHSA-579H-MV94-G4GP
Vulnerability from github – Published: 2022-02-15 01:57 – Updated: 2021-05-20 20:40
VLAI?
Summary
Privilege Escalation in Kubernetes
Details
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
Severity ?
9.8 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/kubernetes/kubernetes"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.11"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/kubernetes/kubernetes"
},
"ranges": [
{
"events": [
{
"introduced": "1.11.0"
},
{
"fixed": "1.11.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/kubernetes/kubernetes"
},
"ranges": [
{
"events": [
{
"introduced": "1.12.0"
},
{
"fixed": "1.12.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2018-1002105"
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"github_reviewed": true,
"github_reviewed_at": "2021-05-20T20:40:04Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.",
"id": "GHSA-579h-mv94-g4gp",
"modified": "2021-05-20T20:40:04Z",
"published": "2022-02-15T01:57:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002105"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/issues/71411"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905"
},
{
"type": "WEB",
"url": "https://www.securityfocus.com/bid/106068"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/46053"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/46052"
},
{
"type": "WEB",
"url": "https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190416-0001"
},
{
"type": "WEB",
"url": "https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"type": "WEB",
"url": "https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88"
},
{
"type": "WEB",
"url": "https://github.com/evict/poc_CVE-2018-1002105"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3754"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3752"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3742"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3624"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3598"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3551"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3549"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3537"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Privilege Escalation in Kubernetes"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…