First published: Mon Sep 20 2021(Updated: )
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Kubernetes | =1.20.11 | |
Kubernetes Kubernetes | =1.21.5 | |
Kubernetes Kubernetes | =1.22.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8561 is a security issue discovered in Kubernetes that allows actors to redirect kube-apiserver requests to private networks.
The severity of CVE-2020-8561 is medium with a CVSS score of 4.1.
Kubernetes versions 1.20.11, 1.21.5, and 1.22.2 are affected by CVE-2020-8561.
Actors can exploit CVE-2020-8561 by controlling the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests to redirect kube-apiserver requests.
To fix CVE-2020-8561, update your Kubernetes version to a patched version as mentioned in the official references.