- Description
- An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8
- Impact score
- 6
- Exploitability score
- 1.3
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- NVD-CWE-Other
- secalert@redhat.com
- CWE-288
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kube-apiserver:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "58A67EBB-3567-46AD-9EF2-8DA8DBABBA03"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0595C9F8-9C7A-4FC1-B7EE-52978A1B1E93"
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454"
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2"
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1FFF1D51-ABA8-4E54-B81C-A88C8A5E4842"
}
],
"operator": "OR"
}
]
}
]