Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-01-21 17:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-8554
Mitre link : CVE-2020-8554
CVE.ORG link : CVE-2020-8554
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_service_communication_proxy
- communications_cloud_native_core_network_slice_selection_function
- communications_cloud_native_core_policy
kubernetes
- kubernetes
CWE