GHSA-833c-xh79-p429

Suggest an improvement
Source
https://github.com/advisories/GHSA-833c-xh79-p429
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-833c-xh79-p429/GHSA-833c-xh79-p429.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-833c-xh79-p429
Aliases
Related
Published
2023-04-21T19:42:10Z
Modified
2024-08-20T20:58:42.720085Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L CVSS Calculator
Summary
A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation
Details

Summary:

A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation.

Detailed analysis:

The clusternet has a deployment called cluster-hub inside the clusternet-system Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called clusternet-hub, which has a cluster role called clusternet:hub via cluster role binding. The clusternet:hub cluster role has "" verbs of ".*" resources. Thus, if a malicious user can access the worker node which runs the clusternet, he/she can leverage the service account to do malicious actions to critical system resources. For example, he/she can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation.

Database specific
{
    "nvd_published_at": "2023-04-24T16:15:07Z",
    "cwe_ids": [
        "CWE-269"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-04-21T19:42:10Z"
}
References

Affected packages

Go / github.com/clusternet/clusternet

Package

Name
github.com/clusternet/clusternet
View open source insights on deps.dev
Purl
pkg:golang/github.com/clusternet/clusternet

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.15.2