ID |
CVE-2020-8554
|
Summary |
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
-
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.14.0:*:*:*:*:*:*:*
-
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 6.0 (as of 29-10-2022 - 02:41) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-noinfo |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
redhat
via4
|
rpms | - atomic-enterprise-service-catalog-1:3.11.374-1.git.1675.738abcc.el7
- atomic-enterprise-service-catalog-svcat-1:3.11.374-1.git.1675.738abcc.el7
- atomic-openshift-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-clients-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-clients-redistributable-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-cluster-autoscaler-0:3.11.374-1.git.0.2996f62.el7
- atomic-openshift-descheduler-0:3.11.374-1.git.299.f128e96.el7
- atomic-openshift-docker-excluder-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-dockerregistry-0:3.11.374-1.git.481.e6a880c.el7
- atomic-openshift-excluder-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-hyperkube-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-hypershift-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-master-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-metrics-server-0:3.11.374-1.git.53.9df25a9.el7
- atomic-openshift-node-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-node-problem-detector-0:3.11.374-1.git.263.28335fb.el7
- atomic-openshift-pod-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-sdn-ovs-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-service-idler-0:3.11.374-1.git.15.523a1f7.el7
- atomic-openshift-template-service-broker-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-tests-0:3.11.374-1.git.0.ebd3ee9.el7
- atomic-openshift-web-console-0:3.11.374-1.git.647.9e78d83.el7
- golang-github-openshift-oauth-proxy-0:3.11.374-1.git.439.966c536.el7
- openshift-ansible-0:3.11.374-1.git.0.92f5956.el7
- openshift-ansible-docs-0:3.11.374-1.git.0.92f5956.el7
- openshift-ansible-playbooks-0:3.11.374-1.git.0.92f5956.el7
- openshift-ansible-roles-0:3.11.374-1.git.0.92f5956.el7
- openshift-ansible-test-0:3.11.374-1.git.0.92f5956.el7
- openshift-enterprise-autoheal-0:3.11.374-1.git.218.9cf7939.el7
- openshift-enterprise-cluster-capacity-0:3.11.374-1.git.379.80bd08f.el7
- openshift-kuryr-cni-0:3.11.374-1.git.1478.ef11824.el7
- openshift-kuryr-common-0:3.11.374-1.git.1478.ef11824.el7
- openshift-kuryr-controller-0:3.11.374-1.git.1478.ef11824.el7
- prometheus-0:3.11.374-1.git.5026.29379c4.el7
- prometheus-alertmanager-0:3.11.374-1.git.0.3abd2a5.el7
- prometheus-node-exporter-0:3.11.374-1.git.1062.490d6d5.el7
- python2-kuryr-kubernetes-0:3.11.374-1.git.1478.ef11824.el7
- python2-urllib3-0:1.26.2-1.el7
|
|
refmap
via4
|
|
Last major update |
29-10-2022 - 02:41 |
Published |
21-01-2021 - 17:15 |
Last modified |
29-10-2022 - 02:41 |