First published: Mon Nov 30 2015(Updated: )
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Dashboard | <=1.2.0 | |
Red Hat OpenShift | =3.0 | |
Red Hat OpenShift | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7528 has a medium severity rating due to the potential for unauthorized access to sensitive pod logs.
To fix CVE-2015-7528, you should upgrade your Kubernetes or OpenShift deployment to the latest version that is beyond 1.2.0-alpha.5.
CVE-2015-7528 affects Kubernetes versions before 1.2.0-alpha.5 and Red Hat OpenShift versions 3.0 and 3.1.
The impact of CVE-2015-7528 is that remote attackers can read arbitrary pod logs, potentially leading to information disclosure.
CVE-2015-7528 was reported by Jordan Liggitt of Atomic OpenShift.