cve/2019/CVE-2019-1002100.md

30 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1002100](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1002100)
![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.0.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Uncontrolled%20Resource%20Consumption&color=brighgreen)
### Description
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Marquesledivan/terraform-aws-k8s
- https://github.com/RohtangLa/terraform-aws-kubernetes
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/novemberrain-test/k8s-aws
- https://github.com/saipasham/kub_test-
- https://github.com/scholzj/aws-kubernetes
- https://github.com/scholzj/aws-minikube
- https://github.com/scholzj/terraform-aws-kubernetes
- https://github.com/scholzj/terraform-aws-minikube
- https://github.com/thirupathi-chintu/terraform-aws-minikube