An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
2023-09-24T01:15:42.707
2024-11-21T07:38:47.050
Modified
CVSSv3.1: 8.0 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | kubernetes | kube-apiserver | - | Yes |
Application | redhat | openshift_container_platform | 4.10 | Yes |
Application | redhat | openshift_container_platform | 4.11 | Yes |
Application | redhat | openshift_container_platform | 4.12 | Yes |
Application | redhat | openshift_container_platform | 4.13 | Yes |