An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.
References
Link | Resource |
---|---|
https://github.com/kyverno/kyverno/releases/tag/v1.8.5 | Release Notes Third Party Advisory |
https://github.com/kyverno/kyverno/compare/v1.8.4...v1.8.5 | Patch Third Party Advisory |
https://github.com/kyverno/kyverno/pull/5713 | Patch Third Party Advisory |
https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm | Patch Third Party Advisory |
https://kyverno.io/docs/writing-policies/verify-images/ | Product |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-12-23 15:15
Updated : 2023-01-04 11:57
NVD link : CVE-2022-47633
Mitre link : CVE-2022-47633
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
kyverno
- kyverno