Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
06 Aug 2024, 16:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-05 20:15
Updated : 2024-08-06 16:30
NVD link : CVE-2024-41820
Mitre link : CVE-2024-41820
CVE.ORG link : CVE-2024-41820
JSON object : View
Products Affected
No product.
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource