Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1002100


In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.


Published

2019-04-01T14:29:00.483

Last Modified

2024-11-21T04:17:42.613

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-770

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application kubernetes kubernetes < 1.11.8 Yes
Application kubernetes kubernetes < 1.12.6 Yes
Application kubernetes kubernetes < 1.13.4 Yes
Application redhat openshift_container_platform 3.10 Yes
Application redhat openshift_container_platform 3.11 Yes

References