First published: Mon Jun 13 2022(Updated: )
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Kctf | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31055 has been classified as a high-severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2022-31055, upgrade your kCTF installation to version 1.6.0 or later.
CVE-2022-31055 allows traffic from any IP, which may expose your challenges to unauthorized access.
Yes, you can configure your environment to restrict traffic manually as a temporary workaround.
CVE-2022-31055 affects all versions of kCTF prior to version 1.6.0.