Show filters
99 Total Results
Displaying 81-90 of 99
Sort by:
Attacker Value
Unknown

CVE-2019-11243

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()
Attacker Value
Unknown

kubectl creates world-writeable cached schema files

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
Attacker Value
Unknown

CVE-2019-9946

Disclosure Date: April 02, 2019 (last updated November 08, 2023)
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
0
Attacker Value
Unknown

CVE-2019-1002100

Disclosure Date: April 01, 2019 (last updated November 08, 2023)
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Attacker Value
Unknown

CVE-2018-18264

Disclosure Date: January 03, 2019 (last updated November 08, 2023)
Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.
0
Attacker Value
Unknown

CVE-2018-1002101

Disclosure Date: December 05, 2018 (last updated November 27, 2024)
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
0
Attacker Value
Unknown

CVE-2018-1002103

Disclosure Date: December 05, 2018 (last updated November 27, 2024)
In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
0
Attacker Value
Unknown

CVE-2018-1002105

Disclosure Date: December 05, 2018 (last updated November 08, 2023)
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
0
Attacker Value
Unknown

CVE-2016-7075

Disclosure Date: September 10, 2018 (last updated November 27, 2024)
It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.
0
Attacker Value
Unknown

CVE-2018-1002100

Disclosure Date: June 02, 2018 (last updated November 26, 2024)
In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.
0