Kanister is a data protection workflow management tool. The kanister has a deployment called default-kanister-operator, which is bound with a ClusterRole called edit via ClusterRoleBinding. The "edit" ClusterRole is one of Kubernetes default-created ClusterRole, and it has the create/patch/udpate verbs of daemonset resources, create verb of serviceaccount/token resources, and impersonate verb of serviceaccounts resources. A malicious user can leverage access the worker node which has this component to make a cluster-level privilege escalation.
History

Wed, 21 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Kanisterio
Kanisterio kanister
CPEs cpe:2.3:a:kanisterio:kanister:0:*:*:*:*:*:*:*
Vendors & Products Kanisterio
Kanisterio kanister
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
Description Kanister is a data protection workflow management tool. The kanister has a deployment called default-kanister-operator, which is bound with a ClusterRole called edit via ClusterRoleBinding. The "edit" ClusterRole is one of Kubernetes default-created ClusterRole, and it has the create/patch/udpate verbs of daemonset resources, create verb of serviceaccount/token resources, and impersonate verb of serviceaccounts resources. A malicious user can leverage access the worker node which has this component to make a cluster-level privilege escalation.
Title Kanister has a potential risk which can be leveraged to make a cluster-level privilege escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-08-20T21:16:41.049Z

Updated: 2024-08-21T16:35:41.804Z

Reserved: 2024-08-12T18:02:04.966Z

Link: CVE-2024-43403

cve-icon Vulnrichment

Updated: 2024-08-21T16:35:37.312Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-20T22:15:04.703

Modified: 2024-08-21T12:30:33.697

Link: CVE-2024-43403

cve-icon Redhat

No data.