### [CVE-2019-11245](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11245) ![](https://img.shields.io/static/v1?label=Product&message=Kubernetes&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=v1.13%3D%20v1.13.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions&color=brighgreen) ### Description In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0. ### POC #### Reference No PoCs from references. #### Github - https://github.com/43622283/awesome-cloud-native-security - https://github.com/ARPSyndicate/cvemon - https://github.com/Metarget/awesome-cloud-native-security - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground - https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground - https://github.com/alphaSeclab/sec-daily-2019 - https://github.com/atesemre/awesome-cloud-native-security - https://github.com/hacking-kubernetes/hacking-kubernetes.info - https://github.com/reni2study/Cloud-Native-Security2 - https://github.com/solareenlo/ft_services