### [CVE-2019-1002100](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1002100) ![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20v1.0.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Uncontrolled%20Resource%20Consumption&color=brighgreen) ### Description In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Marquesledivan/terraform-aws-k8s - https://github.com/RohtangLa/terraform-aws-kubernetes - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground - https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground - https://github.com/hacking-kubernetes/hacking-kubernetes.info - https://github.com/novemberrain-test/k8s-aws - https://github.com/saipasham/kub_test- - https://github.com/scholzj/aws-kubernetes - https://github.com/scholzj/aws-minikube - https://github.com/scholzj/terraform-aws-kubernetes - https://github.com/scholzj/terraform-aws-minikube - https://github.com/thirupathi-chintu/terraform-aws-minikube