Lucene search

K
githubGitHub Advisory DatabaseGHSA-PJ4X-2XR5-W87M
HistoryJul 28, 2023 - 3:33 p.m.

Possible image tampering from missing image validation for Packages

2023-07-2815:33:38
CWE-20
GitHub Advisory Database
github.com
12
crossplane
image validation
tampering
packages
security audit

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.4%

Impact

Crossplanes image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package.

Patches

The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0, all the supported versions of Crossplane at the time of writing.

Workarounds

Only using images from trusted sources and keeping Package editing/creating privileges to administrators only, which should be both considered already best practices.

References

See ADA-XP-23-11 in the Security Audit’s report.

Credits

This was reported as ADA-XP-23-11 by @AdamKorcz and @DavidKorczynski from Ada Logic and facilitated by OSTIF as part of the Security Audit sponsored by CNCF.

Affected configurations

Vulners
Node
crossplanecrossplaneRange1.12.01.12.3
OR
crossplanecrossplaneRange<1.11.5
VendorProductVersionCPE
crossplanecrossplane*cpe:2.3:a:crossplane:crossplane:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.4%

Related for GHSA-PJ4X-2XR5-W87M