An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1260.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.13"
}
]
}
]