Lucene search

K
KubernetesKubernetes

56 matches found

CVE
CVE
added 2023/07/03 9:15 p.m.2799 views

CVE-2023-2727

Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

6.5CVSS6.6AI score0.00147EPSS
CVE
CVE
added 2023/07/03 9:15 p.m.2686 views

CVE-2023-2728

Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubern...

6.5CVSS6.6AI score0.03692EPSS
CVE
CVE
added 2023/10/31 9:15 p.m.914 views

CVE-2023-3676

A security issue was discovered in Kubernetes where a userthat can create pods on Windows nodes may be able to escalate to adminprivileges on those nodes. Kubernetes clusters are only affected if theyinclude Windows nodes.

8.8CVSS8.6AI score0.38794EPSS
CVE
CVE
added 2020/07/22 2:15 p.m.437 views

CVE-2020-8559

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.

6.8CVSS6.6AI score0.63362EPSS
CVE
CVE
added 2018/12/05 9:29 p.m.421 views

CVE-2018-1002105

In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests...

9.8CVSS7.4AI score0.90014EPSS
CVE
CVE
added 2023/10/31 9:15 p.m.415 views

CVE-2023-3955

A security issue was discovered in Kubernetes where a userthat can create pods on Windows nodes may be able to escalate to adminprivileges on those nodes. Kubernetes clusters are only affected if theyinclude Windows nodes.

8.8CVSS8.6AI score0.00579EPSS
CVE
CVE
added 2023/11/14 9:15 p.m.397 views

CVE-2023-5528

A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

8.8CVSS7.8AI score0.14099EPSS
CVE
CVE
added 2020/12/07 10:15 p.m.364 views

CVE-2020-8564

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10,

5.5CVSS5AI score0.00054EPSS
CVE
CVE
added 2021/09/20 5:15 p.m.335 views

CVE-2021-25741

A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.

8.8CVSS7.8AI score0.28996EPSS
CVE
CVE
added 2020/04/01 9:15 p.m.316 views

CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

6.5CVSS6.5AI score0.0011EPSS
CVE
CVE
added 2020/12/07 10:15 p.m.309 views

CVE-2020-8565

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13,

5.5CVSS5.5AI score0.00456EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.283 views

CVE-2019-11248

The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limi...

8.2CVSS6.9AI score0.90895EPSS
CVE
CVE
added 2020/03/27 3:15 p.m.276 views

CVE-2020-8552

The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.

5.3CVSS5AI score0.00161EPSS
CVE
CVE
added 2023/06/16 8:15 a.m.262 views

CVE-2023-2431

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp d...

5.5CVSS5.5AI score0.00007EPSS
CVE
CVE
added 2023/03/01 7:15 p.m.259 views

CVE-2022-3162

Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sh...

6.5CVSS6.9AI score0.00731EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.255 views

CVE-2019-11250

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run ...

6.5CVSS5.7AI score0.00456EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.239 views

CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with acc...

8.1CVSS6.3AI score0.00765EPSS
CVE
CVE
added 2020/06/05 5:15 p.m.231 views

CVE-2020-8555

The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints wit...

6.3CVSS5.2AI score0.12144EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.230 views

CVE-2019-11249

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is mali...

6.5CVSS6.3AI score0.03585EPSS
CVE
CVE
added 2020/12/07 10:15 p.m.216 views

CVE-2020-8563

In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects

5.5CVSS5AI score0.00058EPSS
CVE
CVE
added 2023/03/01 7:15 p.m.213 views

CVE-2022-3294

Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to e...

8.8CVSS7.3AI score0.00283EPSS
CVE
CVE
added 2019/10/17 4:15 p.m.211 views

CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming un...

7.5CVSS7.5AI score0.31924EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.196 views

CVE-2019-11246

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is mali...

6.5CVSS6.3AI score0.01993EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.191 views

CVE-2019-11245

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. ...

7.8CVSS6.1AI score0.00173EPSS
CVE
CVE
added 2021/01/21 5:15 p.m.171 views

CVE-2020-8554

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typical...

6.3CVSS5.7AI score0.30663EPSS
CVE
CVE
added 2020/07/27 8:15 p.m.170 views

CVE-2020-8558

The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally t...

8.8CVSS6.9AI score0.24176EPSS
CVE
CVE
added 2019/04/02 6:30 p.m.166 views

CVE-2019-9946

Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE...

7.5CVSS6.1AI score0.0022EPSS
CVE
CVE
added 2019/04/01 2:29 p.m.165 views

CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run...

6.4CVSS5.9AI score0.51487EPSS
CVE
CVE
added 2020/07/23 5:15 p.m.157 views

CVE-2020-8557

The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storag...

5.5CVSS6AI score0.00064EPSS
CVE
CVE
added 2020/03/27 3:15 p.m.156 views

CVE-2020-8551

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on p...

6.5CVSS5.3AI score0.0015EPSS
CVE
CVE
added 2018/03/13 5:29 p.m.148 views

CVE-2017-1002101

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesyste...

9.6CVSS6.9AI score0.33018EPSS
CVE
CVE
added 2021/09/06 12:15 p.m.116 views

CVE-2021-25737

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

4.9CVSS4.5AI score0.00253EPSS
CVE
CVE
added 2021/09/06 12:15 p.m.114 views

CVE-2021-25735

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node...

6.5CVSS6.5AI score0.18453EPSS
CVE
CVE
added 2020/12/07 10:15 p.m.102 views

CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10,

5.5CVSS5AI score0.00136EPSS
CVE
CVE
added 2022/01/07 12:15 a.m.101 views

CVE-2021-25743

kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.

3CVSS4AI score0.00303EPSS
CVE
CVE
added 2019/12/05 4:15 p.m.94 views

CVE-2018-1002102

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate ...

2.6CVSS4.1AI score0.00283EPSS
CVE
CVE
added 2019/04/01 2:29 p.m.92 views

CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. kubectl patch --type json or "Content-Type: application/json-patch+json") that consumes exce...

6.5CVSS6.4AI score0.1023EPSS
CVE
CVE
added 2023/05/24 5:15 p.m.92 views

CVE-2021-25749

Windows workloads can run as ContainerAdministrator even when those workloads set the runAsNonRoot option to true.

7.8CVSS7.3AI score0.00027EPSS
CVE
CVE
added 2019/04/22 3:29 p.m.87 views

CVE-2019-11244

In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the...

5CVSS4.6AI score0.00102EPSS
CVE
CVE
added 2020/07/23 3:15 p.m.86 views

CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

6.5CVSS6.1AI score0.00287EPSS
CVE
CVE
added 2020/02/03 4:15 p.m.83 views

CVE-2019-11251

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be u...

5.7CVSS5.8AI score0.01993EPSS
CVE
CVE
added 2016/02/03 6:59 p.m.82 views

CVE-2016-1905

The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.

7.7CVSS7AI score0.00133EPSS
CVE
CVE
added 2022/02/01 11:15 a.m.80 views

CVE-2020-8562

As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DN...

3.5CVSS5.2AI score0.12144EPSS
CVE
CVE
added 2016/02/03 6:59 p.m.79 views

CVE-2016-1906

Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.

10CVSS8.4AI score0.01555EPSS
CVE
CVE
added 2021/09/20 5:15 p.m.79 views

CVE-2020-8561

A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log ...

4.1CVSS4.1AI score0.00198EPSS
CVE
CVE
added 2023/10/30 3:15 a.m.79 views

CVE-2021-25736

Kube-proxyon Windows can unintentionally forward traffic to local processeslistening on the same port (“spec.ports[*].port”) as a LoadBalancerService when the LoadBalancer controllerdoes not set the “status.loadBalancer.ingress[].ip” field. Clusterswhere the LoadBalancer controller sets the“status....

6.3CVSS6AI score0.0012EPSS
CVE
CVE
added 2018/03/13 5:29 p.m.71 views

CVE-2017-1002102

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

7.1CVSS5.7AI score0.00345EPSS
CVE
CVE
added 2021/09/20 5:15 p.m.67 views

CVE-2021-25740

A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.

3.5CVSS3.4AI score0.00535EPSS
CVE
CVE
added 2016/04/11 9:59 p.m.61 views

CVE-2015-7528

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.

5.3CVSS5.1AI score0.00366EPSS
CVE
CVE
added 2018/12/05 9:29 p.m.60 views

CVE-2018-1002101

In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.

9.8CVSS9.6AI score0.00436EPSS
Total number of security vulnerabilities56