Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2482 | Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-3wfj-3x8q-hrpg | Kubean vulnerable to cluster-level privilege escalation |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-06T13:25:13.623Z
Reserved: 2024-07-22T13:57:37.137Z
Link: CVE-2024-41820
Updated: 2024-08-06T13:25:07.547Z
Status : Awaiting Analysis
Published: 2024-08-05T20:15:35.850
Modified: 2024-08-06T16:30:24.547
Link: CVE-2024-41820
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA