Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-41939
HistoryNov 19, 2022 - 12:00 a.m.

CVE-2022-41939 Credential exposure when running third-party builders in knative/func

2022-11-1900:00:00
CWE-200
GitHub_M
www.cve.org
cve-2022-41939
knative/func
kubernetes functions
third-party buildpacks
registry credentials
docker socket
malicious container
pr #1442
release 1.8.1
builder image
lifecycle image

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

43.4%

knative.dev/func is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious lifecycle container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid lifecycle image will also mitigate the attack.

CNA Affected

[
  {
    "vendor": "knative",
    "product": "func",
    "versions": [
      {
        "version": "< 1.8.1",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

43.4%

Related for CVELIST:CVE-2022-41939