CVE-2021-4178

A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:5.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:redhat:fabric8-kubernetes:5.8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:a-mq_streams:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_quarkus:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fuse:7.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_quarkus:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-08-24 16:15

Updated : 2024-02-28 19:29


NVD link : CVE-2021-4178

Mitre link : CVE-2021-4178

CVE.ORG link : CVE-2021-4178


JSON object : View

Products Affected

redhat

  • process_automation
  • fabric8-kubernetes
  • integration_camel_k
  • a-mq_streams
  • openshift_application_runtimes
  • build_of_quarkus
  • integration_camel_quarkus
  • descision_manager
  • fuse
CWE
CWE-502

Deserialization of Untrusted Data