Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2482 | Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-3wfj-3x8q-hrpg | Kubean vulnerable to cluster-level privilege escalation |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-06T13:25:13.623Z
Reserved: 2024-07-22T13:57:37.137Z
Link: CVE-2024-41820
Updated: 2024-08-06T13:25:07.547Z
Status : Awaiting Analysis
Published: 2024-08-05T20:15:35.850
Modified: 2024-08-06T16:30:24.547
Link: CVE-2024-41820
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA