id: CVE-2022-45933 info: name: KubeView <=0.1.31 - Information Disclosure author: For3stCo1d severity: critical description: | KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Upgrade KubeView to a version higher than 0.1.31 to mitigate the information disclosure vulnerability (CVE-2022-45933). reference: - https://github.com/benc-uk/kubeview/issues/95 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45933 - https://nvd.nist.gov/vuln/detail/CVE-2022-45933 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-306 epss-score: 0.00808 epss-percentile: 0.79835 cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: kubeview_project product: kubeview shodan-query: http.title:"KubeView" tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project http: - method: GET path: - "{{BaseURL}}/api/scrape/kube-system" matchers-condition: and matchers: - type: word part: body words: - 'BEGIN CERTIFICATE' - 'END CERTIFICATE' - 'kubernetes.io' condition: and - type: status status: - 200 # digest: 490a0046304402206279bdd3cd1494cafc2e27fd8976a75988280374cab0d8060bba254637c738fa022034a2aba56b10fc05f1cd46ddd374f9bb933cc98002787c85f9778a79cecbc93a:922c64590222798bb761d5b6d8e72950