CVE-2019-1002100 – k8s.io/kubernetes
Package
Manager: go
Name: k8s.io/kubernetes
Vulnerable Version: >=1.0 <=1.10 || >=1.11.0 <1.11.8 || >=1.12.0 <1.12.6 || >=1.13.0 <1.13.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.1023 pctl0.92854
Details
Kubernetes DoS Vulnerability In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Metadata
Created: 2022-05-13T01:21:42Z
Modified: 2023-09-28T20:26:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q4rr-64r9-fwgf/GHSA-q4rr-64r9-fwgf.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-q4rr-64r9-fwgf
Finding: F067
Auto approve: 1