An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2468 An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
Github GHSA Github GHSA GHSA-92hx-3mh6-hc49 kube-apiserver authentication bypass vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T05:40:59.774Z

Reserved: 2023-03-07T20:12:18.360Z

Link: CVE-2023-1260

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-24T01:15:42.707

Modified: 2024-11-21T07:38:47.050

Link: CVE-2023-1260

cve-icon Redhat

Severity : Important

Publid Date: 2023-04-04T00:00:00Z

Links: CVE-2023-1260 - Bugzilla

cve-icon OpenCVE Enrichment

No data.