CVE-2018-1002105
Vulnerability from cvelistv5
Published
2018-12-05 21:00
Modified
2024-08-05 12:47
Severity ?
Summary
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
References
jordan@liggitt.nethttp://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
jordan@liggitt.nethttp://www.openwall.com/lists/oss-security/2019/06/28/2
jordan@liggitt.nethttp://www.openwall.com/lists/oss-security/2019/07/06/3
jordan@liggitt.nethttp://www.openwall.com/lists/oss-security/2019/07/06/4
jordan@liggitt.nethttp://www.securityfocus.com/bid/106068Third Party Advisory, VDB Entry
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3537Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3549Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3551Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3598Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3624Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3742Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3752Third Party Advisory
jordan@liggitt.nethttps://access.redhat.com/errata/RHSA-2018:3754Third Party Advisory
jordan@liggitt.nethttps://github.com/evict/poc_CVE-2018-1002105Exploit, Third Party Advisory
jordan@liggitt.nethttps://github.com/kubernetes/kubernetes/issues/71411Issue Tracking, Mitigation, Patch, Third Party Advisory
jordan@liggitt.nethttps://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88
jordan@liggitt.nethttps://security.netapp.com/advisory/ntap-20190416-0001/Third Party Advisory
jordan@liggitt.nethttps://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-DoMitigation, Third Party Advisory
jordan@liggitt.nethttps://www.exploit-db.com/exploits/46052/Exploit, Third Party Advisory, VDB Entry
jordan@liggitt.nethttps://www.exploit-db.com/exploits/46053/Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/06/28/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/07/06/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/07/06/4
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/106068Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3537Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3549Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3551Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3598Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3624Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3742Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3752Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3754Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/evict/poc_CVE-2018-1002105Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/kubernetes/kubernetes/issues/71411Issue Tracking, Mitigation, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190416-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-DoMitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/46052/Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/46053/Exploit, Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
Kubernetes Kubernetes Version: v1.0.x
Version: v1.1.x
Version: v1.2.x
Version: v1.3.x
Version: v1.4.x
Version: v1.5.x
Version: v1.6.x
Version: v1.7.x
Version: v1.8.x
Version: v1.9.x
Version: unspecified   < v1.10.11
Version: unspecified   < v1.11.5
Version: unspecified   < v1.12.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T12:47:57.159Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88",
               },
               {
                  name: "46053",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/46053/",
               },
               {
                  name: "RHSA-2018:3549",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3549",
               },
               {
                  name: "RHSA-2018:3752",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3752",
               },
               {
                  name: "46052",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/46052/",
               },
               {
                  name: "RHSA-2018:3624",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3624",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/kubernetes/kubernetes/issues/71411",
               },
               {
                  name: "RHSA-2018:3742",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3742",
               },
               {
                  name: "RHSA-2018:3754",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3754",
               },
               {
                  name: "RHSA-2018:3537",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3537",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/evict/poc_CVE-2018-1002105",
               },
               {
                  name: "RHSA-2018:3598",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3598",
               },
               {
                  name: "RHSA-2018:3551",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:3551",
               },
               {
                  name: "106068",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/106068",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190416-0001/",
               },
               {
                  name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/06/28/2",
               },
               {
                  name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/07/06/3",
               },
               {
                  name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/07/06/4",
               },
               {
                  name: "openSUSE-SU-2020:0554",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Kubernetes",
               vendor: "Kubernetes",
               versions: [
                  {
                     status: "affected",
                     version: "v1.0.x",
                  },
                  {
                     status: "affected",
                     version: "v1.1.x",
                  },
                  {
                     status: "affected",
                     version: "v1.2.x",
                  },
                  {
                     status: "affected",
                     version: "v1.3.x",
                  },
                  {
                     status: "affected",
                     version: "v1.4.x",
                  },
                  {
                     status: "affected",
                     version: "v1.5.x",
                  },
                  {
                     status: "affected",
                     version: "v1.6.x",
                  },
                  {
                     status: "affected",
                     version: "v1.7.x",
                  },
                  {
                     status: "affected",
                     version: "v1.8.x",
                  },
                  {
                     status: "affected",
                     version: "v1.9.x",
                  },
                  {
                     lessThan: "v1.10.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "v1.11.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "v1.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Reported by Darren Shepherd",
            },
         ],
         dateAssigned: "2018-11-05T00:00:00",
         datePublic: "2018-12-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Unchecked Error Condition",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-26T20:06:09",
            orgId: "a6081bf6-c852-4425-ad4f-a67919267565",
            shortName: "kubernetes",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88",
            },
            {
               name: "46053",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/46053/",
            },
            {
               name: "RHSA-2018:3549",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3549",
            },
            {
               name: "RHSA-2018:3752",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3752",
            },
            {
               name: "46052",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/46052/",
            },
            {
               name: "RHSA-2018:3624",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3624",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/kubernetes/kubernetes/issues/71411",
            },
            {
               name: "RHSA-2018:3742",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3742",
            },
            {
               name: "RHSA-2018:3754",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3754",
            },
            {
               name: "RHSA-2018:3537",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3537",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/evict/poc_CVE-2018-1002105",
            },
            {
               name: "RHSA-2018:3598",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3598",
            },
            {
               name: "RHSA-2018:3551",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:3551",
            },
            {
               name: "106068",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/106068",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190416-0001/",
            },
            {
               name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/06/28/2",
            },
            {
               name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/07/06/3",
            },
            {
               name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/07/06/4",
            },
            {
               name: "openSUSE-SU-2020:0554",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@kubernetes.io",
               DATE_ASSIGNED: "2018-11-05",
               ID: "CVE-2018-1002105",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Kubernetes",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "v1.0.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.1.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.2.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.3.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.4.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.5.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.6.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.7.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.8.x",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "v1.9.x",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "v1.10.11",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "v1.11.5",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "v1.12.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Kubernetes",
                     },
                  ],
               },
            },
            credit: [
               "Reported by Darren Shepherd",
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Unchecked Error Condition",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88",
                     refsource: "CONFIRM",
                     url: "https://groups.google.com/forum/#!topic/kubernetes-announce/GVllWCg6L88",
                  },
                  {
                     name: "46053",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/46053/",
                  },
                  {
                     name: "RHSA-2018:3549",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3549",
                  },
                  {
                     name: "RHSA-2018:3752",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3752",
                  },
                  {
                     name: "46052",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/46052/",
                  },
                  {
                     name: "RHSA-2018:3624",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3624",
                  },
                  {
                     name: "https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do",
                     refsource: "MISC",
                     url: "https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do",
                  },
                  {
                     name: "https://github.com/kubernetes/kubernetes/issues/71411",
                     refsource: "CONFIRM",
                     url: "https://github.com/kubernetes/kubernetes/issues/71411",
                  },
                  {
                     name: "RHSA-2018:3742",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3742",
                  },
                  {
                     name: "RHSA-2018:3754",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3754",
                  },
                  {
                     name: "RHSA-2018:3537",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3537",
                  },
                  {
                     name: "https://github.com/evict/poc_CVE-2018-1002105",
                     refsource: "MISC",
                     url: "https://github.com/evict/poc_CVE-2018-1002105",
                  },
                  {
                     name: "RHSA-2018:3598",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3598",
                  },
                  {
                     name: "RHSA-2018:3551",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:3551",
                  },
                  {
                     name: "106068",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/106068",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190416-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190416-0001/",
                  },
                  {
                     name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/06/28/2",
                  },
                  {
                     name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/07/06/3",
                  },
                  {
                     name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/07/06/4",
                  },
                  {
                     name: "openSUSE-SU-2020:0554",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "a6081bf6-c852-4425-ad4f-a67919267565",
      assignerShortName: "kubernetes",
      cveId: "CVE-2018-1002105",
      datePublished: "2018-12-05T21:00:00",
      dateReserved: "2018-12-05T00:00:00",
      dateUpdated: "2024-08-05T12:47:57.159Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2018-1002105\",\"sourceIdentifier\":\"jordan@liggitt.net\",\"published\":\"2018-12-05T21:29:00.403\",\"lastModified\":\"2024-11-21T03:40:38.970\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.\"},{\"lang\":\"es\",\"value\":\"En todas las versiones de Kubernetes anteriores a la v1.10.11, v1.11.5 y la v1.12.3, el manejo incorrecto de las respuestas de error a las peticiones de actualización en el proxy en kube-apiserver permitían que las peticiones especialmente manipuladas estableciesen una conexión mediante el servidor de la API de Kubernetes a los servidores del backend y enviasen peticiones arbitrarias en la misma conexión directamente al backend, autenticadas con las credenciales TLS del servidor de la API de Kubernetes empleadas para establecer la conexión con el backend.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-388\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.9.11\",\"matchCriteriaId\":\"389826D3-C28B-4EA5-8398-307B06A09A65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.10.0\",\"versionEndIncluding\":\"1.10.10\",\"matchCriteriaId\":\"A71A5EC9-75B0-43DE-B77D-B560D350E99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.11.0\",\"versionEndIncluding\":\"1.11.4\",\"matchCriteriaId\":\"96DEFC7F-6DBC-43C0-AF50-4B8B89A4634D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.12.0\",\"versionEndIncluding\":\"1.12.2\",\"matchCriteriaId\":\"08512A98-DAED-4C31-8B23-A5DF260EA78B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.9.12:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C657CF-5878-465A-BEC7-2718AB267C77\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C10044B3-FBB1-4031-9060-D3A2915B164C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA3ADA26-2B9E-4ABA-A224-910BD75CCE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E80045-56E4-4A83-8168-CFED5E55CE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E792B5DC-CCD2-4A50-B72F-860A3BFAF165\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B75DC91F-0D25-42F9-8B7B-3ECCE6AB8174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50A070E-96A9-45D7-B155-00243D17F7A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBCD38F-BBE8-488C-A8C3-5782F191D915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87326E-0B56-4356-A889-73D026DB1D4B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9A34F5-AC03-4098-A37D-AD50727DDB11\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"http://www.securityfocus.com/bid/106068\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3537\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3549\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3551\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3598\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3624\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3742\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3752\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3754\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/evict/poc_CVE-2018-1002105\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/71411\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88\",\"source\":\"jordan@liggitt.net\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190416-0001/\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/46052/\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/46053/\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/106068\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3537\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3598\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/evict/poc_CVE-2018-1002105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/71411\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/kubernetes-announce/GVllWCg6L88\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190416-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.coalfire.com/The-Coalfire-Blog/December-2018/Kubernetes-Vulnerability-What-You-Can-Should-Do\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/46052/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/46053/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.