Lucene search

K
cvelistKubernetesCVELIST:CVE-2020-8565
HistoryDec 07, 2020 - 10:00 p.m.

CVE-2020-8565 Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9

2020-12-0722:00:19
CWE-532
kubernetes
www.cve.org
9
kubernetes
logging level
authorization tokens
log files
api serverlogs
kubectl
v1.19.3
v1.18.10
v1.17.13
v1.20.0-alpha2

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.002

Percentile

53.9%

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CNA Affected

[
  {
    "product": "Kubernetes",
    "vendor": "Kubernetes",
    "versions": [
      {
        "status": "affected",
        "version": "<= 1.19.3"
      },
      {
        "status": "affected",
        "version": "<= 1.18.10"
      },
      {
        "status": "affected",
        "version": "<= 1.17.13"
      },
      {
        "status": "affected",
        "version": "< 1.20.0-alpha2"
      }
    ]
  }
]

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.002

Percentile

53.9%