KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r | Exploit Third Party Advisory |
https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
31 Jul 2023, 17:33
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:* | |
First Time |
Fit2cloud
Fit2cloud kubepi |
21 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-21 21:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-37917
Mitre link : CVE-2023-37917
CVE.ORG link : CVE-2023-37917
JSON object : View
Products Affected
fit2cloud
- kubepi
CWE