Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
References
Link | Resource |
---|---|
https://github.com/kubernetes/kubernetes/issues/85867 | Issue Tracking Mitigation Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q56CULSH7F7BC4NPS67ZS23ZCLL5TIVK/ |
Configurations
History
No history.
Information
Published : 2019-12-05 16:15
Updated : 2023-11-07 02:51
NVD link : CVE-2018-1002102
Mitre link : CVE-2018-1002102
CVE.ORG link : CVE-2018-1002102
JSON object : View
Products Affected
kubernetes
- kubernetes
fedoraproject
- fedora
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')