Lucene search

K
redhatcveRedhat.comRH:CVE-2022-2837
HistoryAug 16, 2022 - 9:08 a.m.

CVE-2022-2837

2022-08-1609:08:12
redhat.com
access.redhat.com
33
cve-2022-2837
coredns
malicious user
traffic redirection
top-level domains
tld
admission controller
openshift documentation
abuse potential
kubernetes documentation

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.0%

A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.

Mitigation

- Add a default admission controller to prevent the creation of projects or namespaces that match any TLDs.
- Add a warning to the OpenShift documentation that informs users of the potential for abuse in the event any namespaces match a TLD. This warning already exists in the Kubernetes documentation.

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.0%

Related for RH:CVE-2022-2837