In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
References
Link | Resource |
---|---|
https://github.com/kubernetes/minikube/issues/3208 | Issue Tracking Mitigation Third Party Advisory |
https://github.com/kubernetes/minikube/issues/3208 | Issue Tracking Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.1 |
References | () https://github.com/kubernetes/minikube/issues/3208 - Issue Tracking, Mitigation, Third Party Advisory |
Information
Published : 2018-12-05 21:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1002103
Mitre link : CVE-2018-1002103
CVE.ORG link : CVE-2018-1002103
JSON object : View
Products Affected
kubernetes
- minikube
CWE
CWE-352
Cross-Site Request Forgery (CSRF)