CVE-2022-45933

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-45933
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45933.json
Aliases
Published
2022-11-27T03:15:11Z
Modified
2023-11-29T09:53:08.493244Z
Details

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."

References

Affected packages

Git / github.com/benc-uk/kubeview

Affected ranges

Type
GIT
Repo
https://github.com/benc-uk/kubeview
Events
Introduced
0The exact introduced commit is unknown
Last affected

Affected versions

0.*

0.0.8
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.1.20
0.1.30
0.1.31
0.1.8