blob: 6009a02ddb024c097aa71f08472f6fae87238ec6 [file] [log] [blame]
id: GO-2024-2748
modules:
- module: k8s.io/apimachinery
versions:
- fixed: 0.16.13
- introduced: 0.17.0
- fixed: 0.17.9
- introduced: 0.18.0
- fixed: 0.18.7-rc.0
vulnerable_at: 0.18.6
packages:
- package: k8s.io/apimachinery/pkg/util/net
symbols:
- ConnectWithRedirects
- package: k8s.io/apimachinery/pkg/util/proxy
symbols:
- UpgradeAwareHandler.tryUpgrade
derived_symbols:
- UpgradeAwareHandler.ServeHTTP
- module: k8s.io/kubernetes
versions:
- fixed: 1.16.13
- introduced: 1.17.0
- fixed: 1.17.9
- introduced: 1.18.0
- fixed: 1.18.7
vulnerable_at: 0.18.6
summary: Privilege Escalation in Kubernetes in k8s.io/apimachinery
description: |-
The Kubernetes kube-apiserver is vulnerable to an unvalidated redirect on
proxied upgrade requests that could allow an attacker to escalate privileges
from a node compromise to a full cluster compromise.
cves:
- CVE-2020-8559
ghsas:
- GHSA-33c5-9fx5-fvjm
references:
- advisory: https://github.com/advisories/GHSA-33c5-9fx5-fvjm
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1851422
- web: https://github.com/kubernetes/kubernetes/issues/92914
- web: https://github.com/kubernetes/kubernetes/pull/92941
- web: https://github.com/tdwyer/CVE-2020-8559
- web: https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ
- web: https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs
- web: https://security.netapp.com/advisory/ntap-20200810-0004
source:
id: GHSA-33c5-9fx5-fvjm
created: 2024-05-17T15:54:30.22341-04:00
review_status: REVIEWED