Lucene search

K
cveGitHub_MCVE-2024-42363
HistoryAug 20, 2024 - 9:15 p.m.

CVE-2024-42363

2024-08-2021:15:14
CWE-502
GitHub_M
web.nvd.nist.gov
32
yaml deserialization kubernetes rce vulnerability 3385

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0

Percentile

10.9%

Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.

Affected configurations

Vulners
Vulnrichment
Node
zendesksamlrRange<3385
VendorProductVersionCPE
zendesksamlr*cpe:2.3:a:zendesk:samlr:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Zendesk",
    "product": "Samson",
    "versions": [
      {
        "version": "< 3385",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0

Percentile

10.9%

Related for CVE-2024-42363