First published: Fri Oct 23 2020(Updated: )
A flaw was found in kubernetes. If a potential attacker can already create or edit services and pods, then they may be able to intercept traffic from other pods (or nodes) in the cluster.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/atomic-openshift | <0:3.11.374-1.git.0.ebd3ee9.el7 | 0:3.11.374-1.git.0.ebd3ee9.el7 |
Kubernetes Kubernetes | ||
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.2.1 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
Oracle Communications Cloud Native Core Service Communication Proxy | =1.14.0 |
ExternalIP addresses ranges can be configured as described below. OCP 4 is secure by default, though cluster-admins can whitelist externalIP addresses as needed. OCP 3.11 can be secured by changing `externalIPNetworkCIDR` to "0.0.0.0/32", which blocks all externalIP address values. https://docs.openshift.com/container-platform/4.6/networking/configuring_ingress_cluster_traffic/configuring-externalip.html https://docs.openshift.com/container-platform/3.11/admin_guide/tcp_ingress_external_ports.html#service-externalip Users can check if they have permission to patch the Status of a LoadBalancer Service with the command: `kubectl auth can-i patch service --subresource=status`. In OCP, by default only cluster-admins are granted this permission.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8554.
The severity of CVE-2020-8554 is medium (6.3).
An attacker can exploit CVE-2020-8554 by creating a ClusterIP service and setting the spec.externalIPs field to intercept traffic.
All versions of Kubernetes are affected by CVE-2020-8554.
You can find more information about CVE-2020-8554 in the references provided.