logo

CVE-2018-1002103 k8s.io/minikube

Package

Manager: go
Name: k8s.io/minikube
Vulnerable Version: >=0.3.0 <=0.29.0

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00175 pctl0.39327

Details

Minikube RCE via DNS Rebinding In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.

Metadata

Created: 2022-05-13T01:35:04Z
Modified: 2023-07-21T21:47:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6pcv-qqx4-mxm3/GHSA-6pcv-qqx4-mxm3.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-6pcv-qqx4-mxm3
Finding: F007
Auto approve: 1