GHSA-g8fc-vrcg-8vjg – github.com/edgelesssys/constellation/v2
Package
Manager: go
Name: github.com/edgelesssys/constellation/v2
Vulnerable Version: >=0 <2.16.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Constallation has pods exposed to peers in VPC ### Impact Cilium allows outside actors (`world` entity) to directly access pods with their internal pod IP, even if they are not exposed explicitly (e.g. via `LoadBalancer`). A pod that does not authenticate clients and that does not exclude `world` traffic via network policy may leak sensitive data to an attacker _inside the cloud VPC_. ### Patches The issue has been patched in [v2.16.3](https://github.com/edgelesssys/constellation/releases/tag/v2.16.3). ### Workarounds This network policy excludes all `world` traffic. It mitigates the problem, but will also block all desired external traffic. If vulnerable pods are known, a policy can be crafted to only firewall those instead (see also https://docs.cilium.io/en/stable/security/policy/language/#access-to-from-outside-cluster). ```yaml apiVersion: "cilium.io/v2" kind: CiliumClusterwideNetworkPolicy metadata: name: "from-world-to-role-public" spec: endpointSelector: matchLabels: {} # role: public ingressDeny: - fromEntities: - world ``` ### References The tracking bug for a Cilium-side fix is https://github.com/cilium/cilium/issues/25626.
Metadata
Created: 2024-04-15T18:13:15Z
Modified: 2024-06-04T19:35:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-g8fc-vrcg-8vjg/GHSA-g8fc-vrcg-8vjg.json
CWE IDs: ["CWE-940"]
Alternative ID: N/A
Finding: F332
Auto approve: 1