mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-16 20:27:21 +00:00
27 lines
1.4 KiB
Markdown
27 lines
1.4 KiB
Markdown
|
|
### [CVE-2019-11245](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11245)
|
||
|
|

|
||
|
|

|
||
|
|

|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
No PoCs from references.
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/43622283/awesome-cloud-native-security
|
||
|
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
|
- https://github.com/Metarget/awesome-cloud-native-security
|
||
|
|
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
|
||
|
|
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
|
||
|
|
- https://github.com/alphaSeclab/sec-daily-2019
|
||
|
|
- https://github.com/atesemre/awesome-cloud-native-security
|
||
|
|
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
|
||
|
|
- https://github.com/reni2study/Cloud-Native-Security2
|
||
|
|
- https://github.com/solareenlo/ft_services
|
||
|
|
|