A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
2022-08-24T16:15:09.770
2024-11-21T06:37:04.627
Modified
CVSSv3.1: 6.7 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | fabric8-kubernetes | < 5.0.3 | Yes |
Application | redhat | fabric8-kubernetes | < 5.1.2 | Yes |
Application | redhat | fabric8-kubernetes | < 5.3.2 | Yes |
Application | redhat | fabric8-kubernetes | < 5.7.4 | Yes |
Application | redhat | fabric8-kubernetes | < 5.10.2 | Yes |
Application | redhat | fabric8-kubernetes | < 5.11.2 | Yes |
Application | redhat | fabric8-kubernetes | 5.0.0 | Yes |
Application | redhat | fabric8-kubernetes | 5.8.0 | Yes |
Application | redhat | a-mq_streams | 2.0.1 | Yes |
Application | redhat | build_of_quarkus | 2.2.5 | Yes |
Application | redhat | descision_manager | 7.0 | Yes |
Application | redhat | fuse | 7.11 | Yes |
Application | redhat | integration_camel_k | - | Yes |
Application | redhat | integration_camel_quarkus | 2.2.1 | Yes |
Application | redhat | openshift_application_runtimes | - | Yes |
Application | redhat | process_automation | 7.0 | Yes |