Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.
References
Link | Resource |
---|---|
https://github.com/kubernetes/kubernetes/issues/113756 | Issue Tracking Vendor Advisory |
https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-03-01 11:15
Updated : 2023-03-08 16:57
NVD link : CVE-2022-3162
Mitre link : CVE-2022-3162
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
kubernetes
- kubernetes