Kubean is a cluster lifecycle management toolchain based on kubespray and other cluster LCM engine. The ClusterRole has `*` verbs of `*` resources. If a malicious user can access the worker node which has kubean's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been addressed in release version 0.18.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-05T20:07:49.048Z
Updated: 2024-08-06T13:25:13.623Z
Reserved: 2024-07-22T13:57:37.137Z
Link: CVE-2024-41820
Vulnrichment
Updated: 2024-08-06T13:25:07.547Z
NVD
Status : Awaiting Analysis
Published: 2024-08-05T20:15:35.850
Modified: 2024-08-06T16:30:24.547
Link: CVE-2024-41820
Redhat
No data.