Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

#a6081bf6-c852-4425-ad4f-a67919267565

Security Advisories

Reported CVEsVendorsProductsReports
109Vulnerabilities found

CVE-2019-11244
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-3.3||LOW
EPSS-0.10% / 28.00%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 14:54
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
kubectl creates world-writeable cached schema files

In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.

Action-Not Available
Vendor-NetApp, Inc.Red Hat, Inc.Kubernetes
Product-kubernetesopenshift_container_platformtridentKubernetes
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11243
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-3.1||LOW
EPSS-0.25% / 47.75%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 14:54
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()

Action-Not Available
Vendor-NetApp, Inc.Kubernetes
Product-kubernetestridentKubernetes
CWE ID-CWE-271
Privilege Dropping / Lowering Errors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2018-1002103
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-8.1||HIGH
EPSS-0.18% / 38.94%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 21:00
Updated-16 Sep, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.

Action-Not Available
Vendor-Kubernetes
Product-minikubeMinikube
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2018-1002105
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-9.8||CRITICAL
EPSS-90.70% / 99.61%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 21:00
Updated-05 Aug, 2024 | 12:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.

Action-Not Available
Vendor-NetApp, Inc.Red Hat, Inc.Kubernetes
Product-kubernetesopenshift_container_platformtridentKubernetes
CWE ID-CWE-388
Not Available
CVE-2018-1002101
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-5.9||MEDIUM
EPSS-1.01% / 76.72%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 21:00
Updated-05 Aug, 2024 | 12:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.

Action-Not Available
Vendor-Kubernetes
Product-kubernetesKubernetes
CVE-2018-1002100
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-4.2||MEDIUM
EPSS-0.51% / 65.84%
||
7 Day CHG~0.00%
Published-01 Jun, 2018 | 21:00
Updated-16 Sep, 2024 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

Action-Not Available
Vendor-Kubernetes
Product-kubernetesKubernetes
CWE ID-CWE-20
Improper Input Validation
CVE-2017-1002101
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-8.8||HIGH
EPSS-33.51% / 96.82%
||
7 Day CHG~0.00%
Published-13 Mar, 2018 | 17:00
Updated-05 Aug, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.

Action-Not Available
Vendor-Kubernetes
Product-kubernetesKubernetes
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2017-1002102
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-7.1||HIGH
EPSS-0.49% / 64.89%
||
7 Day CHG~0.00%
Published-13 Mar, 2018 | 17:00
Updated-05 Aug, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

Action-Not Available
Vendor-Kubernetes
Product-kubernetesKubernetes
CVE-2017-1002100
Assigner-Kubernetes
ShareView Details
Assigner-Kubernetes
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 49.85%
||
7 Day CHG~0.00%
Published-14 Sep, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

Action-Not Available
Vendor-Kubernetes
Product-kubernetesKubernetes
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • Next