First published: Wed Dec 05 2018(Updated: )
In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/minikube | >=0.3.0<=0.29.0 | |
Kubernetes Minikube | >=0.3.0<=0.29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1002103 is a vulnerability in Minikube versions 0.3.0-0.29.0 that exposes the Kubernetes Dashboard, allowing attackers to create a new Kubernetes Deployment running arbitrary malicious containers.
CVE-2018-1002103 affects Minikube versions 0.3.0-0.29.0 by exposing the Kubernetes Dashboard on the VM IP at port 30000.
CVE-2018-1002103 has a severity rating of 8.8 (high).
An attacker can exploit CVE-2018-1002103 by using DNS rebinding to indirectly make requests to the Kubernetes Dashboard and create a new Kubernetes Deployment running arbitrary malicious containers.
To fix CVE-2018-1002103, upgrade Minikube to a version higher than 0.29.0.