Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. "disallow-privileged-containers," can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0.
References
Link | Resource |
---|---|
https://github.com/kyverno/kyverno/security/advisories/GHSA-qjvc-p88j-j9rm | Exploit Vendor Advisory |
Configurations
History
07 Nov 2024, 17:20
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.7 |
First Time |
Nirmata
Nirmata kyverno |
|
CPE | cpe:2.3:a:nirmata:kyverno:*:*:*:*:*:go:*:* | |
References | () https://github.com/kyverno/kyverno/security/advisories/GHSA-qjvc-p88j-j9rm - Exploit, Vendor Advisory |
01 Nov 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-29 15:15
Updated : 2024-11-07 17:20
NVD link : CVE-2024-48921
Mitre link : CVE-2024-48921
CVE.ORG link : CVE-2024-48921
JSON object : View
Products Affected
nirmata
- kyverno