You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description from CVE
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Explanation
The kubernetes and apiserver packages are vulnerable to Unintended Proxy attacks. The NewGenericWebhook() function in webhook.go provides no mechanism to limit the following of redirects in cases where a MutatingWebhookConfiguration or ValidatingWebhookConfiguration request receives a HTTP redirect as a response. An attacker who can control the response of a MutatingWebhookConfiguration or ValidatingWebhookConfiguration request, and who has access to the kube-apiserver process logs, can exploit this vulnerability by sending a crafted HTTP response which redirects the request to endpoints within private networks to which the apiserver is connected. The attacker can then view the responses and headers of the redirected requests in the process logs, allowing them to gain sensitive information about protected network resources.
Advisory Deviation Notice:
The Sonatype Security Research team has created a CVSS score that differs from the publicly available score that, based on our research, more accurately reflects the severity of the vulnerability.
Reference:kubernetes/kubernetes#104720
Description
Description from CVE
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Explanation
The kubernetes and apiserver packages are vulnerable to Unintended Proxy attacks. The NewGenericWebhook() function in webhook.go provides no mechanism to limit the following of redirects in cases where a MutatingWebhookConfiguration or ValidatingWebhookConfiguration request receives a HTTP redirect as a response. An attacker who can control the response of a MutatingWebhookConfiguration or ValidatingWebhookConfiguration request, and who has access to the kube-apiserver process logs, can exploit this vulnerability by sending a crafted HTTP response which redirects the request to endpoints within private networks to which the apiserver is connected. The attacker can then view the responses and headers of the redirected requests in the process logs, allowing them to gain sensitive information about protected network resources.
Advisory Deviation Notice:
The Sonatype Security Research team has created a CVSS score that differs from the publicly available score that, based on our research, more accurately reflects the severity of the vulnerability.
Reference:kubernetes/kubernetes#104720
Affected Modules, Packages, Versions and Symbols
Does this vulnerability already have an associated CVE ID?
Yes
CVE ID
CVE-2020-8561
Credit
No response
CWE ID
No response
Pull Request
No response
Commit
No response
References
No response
Additional information
No response
The text was updated successfully, but these errors were encountered: