CVE-2022-45933

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
References
Link Resource
https://github.com/benc-uk/kubeview/issues/95 Exploit Issue Tracking Third Party Advisory
https://github.com/benc-uk/kubeview/issues/95 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:29

Type Values Removed Values Added
References () https://github.com/benc-uk/kubeview/issues/95 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/benc-uk/kubeview/issues/95 - Exploit, Issue Tracking, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 CWE-306

Information

Published : 2022-11-27 03:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45933

Mitre link : CVE-2022-45933

CVE.ORG link : CVE-2022-45933


JSON object : View

Products Affected

kubeview_project

  • kubeview
CWE
CWE-306

Missing Authentication for Critical Function