diff --git a/http/cves/2023/CVE-2023-22480.yaml b/http/cves/2023/CVE-2023-22480.yaml index 6e129ccd94..08aceb7382 100644 --- a/http/cves/2023/CVE-2023-22480.yaml +++ b/http/cves/2023/CVE-2023-22480.yaml @@ -1,25 +1,26 @@ id: CVE-2023-22480 info: - name: KubeOperator Foreground kubeconfig Download + name: KubeOperator Foreground `kubeconfig` - File Download author: DhiyaneshDk severity: critical description: | KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2023-22480 - https://github.com/KubeOperator/KubeOperator/security/advisories/GHSA-jxgp-jgh3-8jc8 - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/KubeOperator/KubeOperator%20kubeconfig%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE%E6%BC%8F%E6%B4%9E%20CVE-2023-22480.md?plain=1 + - https://nvd.nist.gov/vuln/detail/CVE-2023-22480 classification: + cve-id: CVE-2023-22480 cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cwe-id: CWE-863 metadata: max-request: 1 + verified: true shodan-query: html:"KubeOperator" fofa-query: app="KubeOperator" - verified: true - tags: cve,cve2023,kubeoperator,k8s,kubeconfig + tags: cve,cve2023,kubeoperator,k8s,kubeconfig,exposure http: - method: GET