Lucene search

K
githubGitHub Advisory DatabaseGHSA-437M-7HJ5-9MPW
HistoryJan 05, 2024 - 4:01 p.m.

Kruise allows leveraging the kruise-daemon pod to list all secrets in the entire cluster

2024-01-0516:01:24
CWE-250
CWE-269
GitHub Advisory Database
github.com
9
kruise
daemon pod
secrets
cluster
attacker
root privilege
imagepulljob
workarounds
patches
update
security

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

19.4%

Impact

Attacker that has gain root privilege of the node that kruise-daemon run , can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, attackers can leverage the “captured” secrets (e.g. the kruise-manager service account token) to gain extra privilege such as pod modification.

Workarounds

For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege

Patches

For users who’re using v0.8.x ~ v1.2.x, please update the v1.3.1
For users who’re using v1.3, please update the v1.3.1
For users who’re using v1.4, please update the v1.4.1
For users who’re using v1.5, please update the v1.5.2

References

None

Affected configurations

Vulners
Node
openkruisekruiseRange1.5.01.5.2
OR
openkruisekruiseRange1.4.01.4.1
OR
openkruisekruiseRange0.8.01.3.1
VendorProductVersionCPE
openkruisekruise*cpe:2.3:a:openkruise:kruise:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

19.4%

Related for GHSA-437M-7HJ5-9MPW