Lucene search

K
prionPRIOn knowledge basePRION:CVE-2020-11710
HistoryApr 12, 2020 - 5:15 p.m.

Design/Logic Flaw

2020-04-1217:15:00
PRIOn knowledge base
www.prio-n.com
4

9.2 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.5%

An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. β€œ1) Inaccurate Bug Scope - The issue scope was on Kong’s docker-compose template, and not Kong’s docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating β€˜An issue was discovered in docker-kong (for Kong) through 2.0.3.’ is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a β€œPatch” link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic.

CPENameOperatorVersion
docker-kongle2.0.3

9.2 High

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.5%

Related for PRION:CVE-2020-11710