Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-2081 | Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet. |
Fixes
Solution
No solution given by the vendor.
Workaround
For Kubernetes versions >= v1.10.0, the ValidateProxyRedirects feature can be manually enabled with the kube-apiserver flag --feature-gates=ValidateProxyRedirects=true
References
History
No history.

Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2024-09-17T00:56:37.681Z
Reserved: 2018-12-05T00:00:00
Link: CVE-2018-1002102

No data.

Status : Modified
Published: 2019-12-05T16:15:10.427
Modified: 2024-11-21T03:40:38.570
Link: CVE-2018-1002102


No data.