Kubernetes

Kubernetes

62 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Veröffentlicht 23.07.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:48

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

Exploit
  • EPSS 60.11%
  • Veröffentlicht 22.07.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 05:39:01

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise...

  • EPSS 16.51%
  • Veröffentlicht 05.06.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:01

The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arb...

  • EPSS 0.11%
  • Veröffentlicht 01.04.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:20:48

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

  • EPSS 0.09%
  • Veröffentlicht 27.03.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:01

The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.

  • EPSS 0.89%
  • Veröffentlicht 27.03.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:01

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and ...

  • EPSS 1.99%
  • Veröffentlicht 03.02.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:48

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specif...

  • EPSS 0.21%
  • Veröffentlicht 05.12.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 03:40:38

Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the r...

Exploit
  • EPSS 39.06%
  • Veröffentlicht 17.10.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:20:48

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CP...

  • EPSS 0.87%
  • Veröffentlicht 29.08.2019 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:48

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use ...