cve/2019/CVE-2019-11245.md

27 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-11245](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11245)
![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=v1.13%3D%20v1.13.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions&color=brighgreen)
### Description
In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/solareenlo/ft_services