KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/kubevela/kubevela/pull/5000 | Patch Third Party Advisory |
https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 | Third Party Advisory |
https://github.com/kubevela/kubevela/pull/5000 | Patch Third Party Advisory |
https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
References | () https://github.com/kubevela/kubevela/pull/5000 - Patch, Third Party Advisory | |
References | () https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 - Third Party Advisory |
Information
Published : 2022-11-16 20:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-39383
Mitre link : CVE-2022-39383
CVE.ORG link : CVE-2022-39383
JSON object : View
Products Affected
linuxfoundation
- kubevela
CWE
CWE-918
Server-Side Request Forgery (SSRF)