mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
68 lines
2.8 KiB
JSON
68 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-41820",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-08-05T20:15:35.850",
|
|
"lastModified": "2024-08-06T16:30:24.547",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Kubean es una cadena de herramientas de gesti\u00f3n del ciclo de vida del cl\u00faster basada en kubespray y otros motores LCM del cl\u00faster. ClusterRole tiene verbos `*` de recursos `*`. Si un usuario malintencionado puede acceder al nodo trabajador que tiene la implementaci\u00f3n de Kubean, puede abusar de estos permisos excesivos para hacer lo que quiera en todo el cl\u00faster, lo que resultar\u00e1 en una escalada de privilegios a nivel de cl\u00faster. Este problema se solucion\u00f3 en la versi\u00f3n 0.18.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
|
|
"baseScore": 6.0,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 4.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-732"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/kubean-io/kubean/commit/167e97329e4a27ba2f456d2846d39af20e1af7ef",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/kubean-io/kubean/issues/1326",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/kubean-io/kubean/security/advisories/GHSA-3wfj-3x8q-hrpg",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |