Lucene search

K
osvGoogleOSV:GHSA-PXHW-596R-RWQ5
HistoryApr 23, 2024 - 12:30 a.m.

Kubernetes allows bypassing mountable secrets policy imposed by the ServiceAccount admission plugin

2024-04-2300:30:45
Google
osv.dev
8
kubernetes
security issue
serviceaccount admission plugin

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

3.6 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service accountโ€™s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

3.6 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%