Vigil@nce - Kubernetes: read-write access via API Server Cluster-scoped Resource
October 2019 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer-vulnerability-database-and-alert
SYNTHESIS OF THE VULNERABILITY
Impacted products: Fedora, Kubernetes.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: user account.
Confidence: confirmed by the editor (5/5).
Creation date: 06/08/2019.
DESCRIPTION OF THE VULNERABILITY
An attacker can bypass access restrictions via API Server
Cluster-scoped Resource of Kubernetes, in order to read or alter
data.
ACCESS TO THE FULL VIGIL@NCE BULLETIN