logo

CVE-2020-8565 k8s.io/client-go

Package

Manager: go
Name: k8s.io/client-go
Vulnerable Version: >=0.19.0 <0.19.6 || >=0.20.0-alpha.0 <0.20.0-alpha.2 || >=0.18.0 <0.18.14 || >=0 <0.17.16

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:H/SA:N

EPSS: 0.00058 pctl0.18382

Details

Kubernetes client-go vulnerable to Sensitive Information Leak via Log File In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.

Metadata

Created: 2023-02-06T23:27:56Z
Modified: 2024-05-20T19:48:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-8cfg-vx93-jvxw/GHSA-8cfg-vx93-jvxw.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-8cfg-vx93-jvxw
Finding: F091
Auto approve: 1