First published: Tue Jul 23 2019(Updated: )
The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/apiextensions-apiserver | >=0.15.0<0.15.2 | 0.15.2 |
go/k8s.io/apiextensions-apiserver | >=0.14.0<0.14.5 | 0.14.5 |
go/k8s.io/apiextensions-apiserver | >=0.7.0<0.13.9 | 0.13.9 |
redhat/kubernetes | <1.13.9 | 1.13.9 |
redhat/kubernetes | <1.14.5 | 1.14.5 |
redhat/kubernetes | <1.15.2 | 1.15.2 |
redhat/kubernetes | <1.16.0 | 1.16.0 |
redhat/atomic-openshift | <0:3.10.170-1.git.0.8e592d6.el7 | 0:3.10.170-1.git.0.8e592d6.el7 |
redhat/ansible-service-broker | <1:1.3.23-2.el7 | 1:1.3.23-2.el7 |
redhat/ansible-service-broker | <0:1.1.20-2.el7 | 0:1.1.20-2.el7 |
redhat/atomic-openshift | <0:3.9.101-1.git.0.150f595.el7 | 0:3.9.101-1.git.0.150f595.el7 |
redhat/atomic-openshift-descheduler | <0:3.9.13-2.git.267.bb59a3f.el7 | 0:3.9.13-2.git.267.bb59a3f.el7 |
redhat/atomic-openshift-dockerregistry | <0:3.9.101-1.git.1.13625cf.el7 | 0:3.9.101-1.git.1.13625cf.el7 |
redhat/atomic-openshift-node-problem-detector | <0:3.9.13-2.git.167.5d6b0d4.el7 | 0:3.9.13-2.git.167.5d6b0d4.el7 |
redhat/atomic-openshift-web-console | <0:3.9.101-1.git.1.601c6d2.el7 | 0:3.9.101-1.git.1.601c6d2.el7 |
redhat/cockpit | <0:195-2.rhaos.el7 | 0:195-2.rhaos.el7 |
redhat/containernetworking-plugins | <0:0.5.2-6.el7 | 0:0.5.2-6.el7 |
redhat/cri-o | <0:1.9.16-3.git858756d.el7 | 0:1.9.16-3.git858756d.el7 |
redhat/cri-tools | <0:1.0.0-6.rhaos3.9.git8e6013a.el7 | 0:1.0.0-6.rhaos3.9.git8e6013a.el7 |
redhat/golang-github-openshift-oauth-proxy | <0:2.1-3.git885c9f40.el7 | 0:2.1-3.git885c9f40.el7 |
redhat/golang-github-openshift-prometheus-alert-buffer | <0:0-3.gitceca8c1.el7 | 0:0-3.gitceca8c1.el7 |
redhat/golang-github-prometheus-alertmanager | <0:0.14.0-2.git30af4d0.el7 | 0:0.14.0-2.git30af4d0.el7 |
redhat/golang-github-prometheus-prometheus | <0:2.2.1-2.gitbc6058c.el7 | 0:2.2.1-2.gitbc6058c.el7 |
redhat/golang-github-prometheus-promu | <0:0-5.git85ceabc.el7 | 0:0-5.git85ceabc.el7 |
redhat/hawkular-openshift-agent | <0:1.2.2-3.el7 | 0:1.2.2-3.el7 |
redhat/heapster | <0:1.3.0-4.el7 | 0:1.3.0-4.el7 |
redhat/image-inspector | <0:2.1.3-2.el7 | 0:2.1.3-2.el7 |
redhat/openshift-enterprise-image-registry | <0:3.8.0-2.git.216.b6b90bb.el7 | 0:3.8.0-2.git.216.b6b90bb.el7 |
redhat/openshift-eventrouter | <0:0.1-3.git5bd9251.el7 | 0:0.1-3.git5bd9251.el7 |
redhat/openshift-external-storage | <0:0.0.1-9.git78d6339.el7 | 0:0.0.1-9.git78d6339.el7 |
redhat/openvswitch-ovn-kubernetes | <0:0.1.0-3.el7 | 0:0.1.0-3.el7 |
redhat/openshift | <0:4.1.10-201908060758.git.0.d81afa6.el8 | 0:4.1.10-201908060758.git.0.d81afa6.el8 |
Kubernetes Kubernetes | >=1.7.0<=1.12.10 | |
Kubernetes Kubernetes | >=1.13.0<1.13.9 | |
Kubernetes Kubernetes | >=1.14.0<1.14.5 | |
Kubernetes Kubernetes | >=1.15.0<1.15.2 | |
Kubernetes Kubernetes | =1.12.11-beta0 | |
Redhat Openshift Container Platform | =3.9 | |
Redhat Openshift Container Platform | =3.10 | |
Redhat Openshift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11247 is a vulnerability in the Kubernetes kube-apiserver that allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced.
CVE-2019-11247 has a severity rating of 8.1, which is considered high.
Kubernetes versions between 1.7.0 and 1.12.10, 1.13.0 and 1.13.9, and 1.14.0 and 1.14.5 are affected by CVE-2019-11247, as well as Redhat Openshift Container Platform 3.9, 3.10, and 3.11.
To fix CVE-2019-11247, users should update to k8s.io/apiextensions-apiserver version 0.15.2, 0.14.5, or 0.13.9 depending on the affected Kubernetes version.
More information about CVE-2019-11247 can be found on the CVE website (https://www.cve.org/CVERecord?id=CVE-2019-11247), NIST National Vulnerability Database (https://nvd.nist.gov/vuln/detail/CVE-2019-11247), and Redhat Bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1732192).