Skip to content

CVE-2022-3162: Unauthorized read of Custom Resources #113756

Closed
@tallclair

Description

@tallclair

CVSS Rating: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization.

Am I vulnerable?

Clusters are impacted by this vulnerability if all of the following are true:

  • There are 2+ CustomResourceDefinitions sharing the same API group
  • Users have cluster-wide list or watch authorization on one of those custom resources.
  • The same users are not authorized to read another custom resource in the same API group.

Affected Versions

  • Kubernetes kube-apiserver <= v1.25.3
  • Kubernetes kube-apiserver <= v1.24.7
  • Kubernetes kube-apiserver <= v1.23.13
  • Kubernetes kube-apiserver <= v1.22.15

How do I mitigate this vulnerability?

Upgrading the kube-apiserver to a fixed version mitigates this vulnerability.

Prior to upgrading, this vulnerability can be mitigated by avoiding granting cluster-wide list and watch permissions.

Fixed Versions

  • Kubernetes kube-apiserver v1.25.4
  • Kubernetes kube-apiserver v1.24.8
  • Kubernetes kube-apiserver v1.23.14
  • Kubernetes kube-apiserver v1.22.16

Detection

Requests containing .. in the request path are a likely indicator of exploitation. Request paths may be captured in API audit logs, or in kube-apiserver HTTP logs.

If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io

Acknowledgements

This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit.

/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig api-machinery
/area apiserver

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/apiserverarea/securitycommittee/security-responseDenotes an issue or PR intended to be handled by the product security committee.kind/bugCategorizes issue or PR as related to a bug.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.official-cve-feedIssues or PRs related to CVEs officially announced by Security Response Committee (SRC)sig/api-machineryCategorizes an issue or PR as relevant to SIG API Machinery.triage/acceptedIndicates an issue or PR is ready to be actively worked on.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions