CVE-2023-37916
- EPSS 0.18%
- Veröffentlicht 21.07.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 08:12:27
KubePi is an opensource kubernetes management panel. The endpoint /kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password hash of any user (including admin). A sufficiently motivated attacker may be able to crack leaded password hashes. This...
CVE-2023-37917
- EPSS 0.09%
- Veröffentlicht 21.07.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 08:12:28
KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue ...
CVE-2023-22478
- EPSS 83.67%
- Veröffentlicht 14.01.2023 01:15:14
- Zuletzt bearbeitet 21.11.2024 07:44:53
KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.
CVE-2023-22479
- EPSS 0.12%
- Veröffentlicht 10.01.2023 21:15:12
- Zuletzt bearbeitet 21.11.2024 07:44:53
KubePi is a modern Kubernetes panel. A session fixation attack allows an attacker to hijack a legitimate user session, versions 1.6.3 and below are susceptible. A patch will be released in version 1.6.4.
CVE-2023-22463
- EPSS 91.46%
- Veröffentlicht 04.01.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 07:44:51
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administ...