First published: Fri Sep 16 2022(Updated: )
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift | <0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el8 | 0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el8 |
redhat/openshift | <0:4.11.0-202210122157.p0.g5157800.assembly.stream.el8 | 0:4.11.0-202210122157.p0.g5157800.assembly.stream.el8 |
redhat/openshift | <0:4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9 | 0:4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9 |
redhat/kube-apiserver | <1.25.1 | 1.25.1 |
redhat/kube-apiserver | <1.24.5 | 1.24.5 |
redhat/kube-apiserver | <1.23.11 | 1.23.11 |
redhat/kube-apiserver | <1.22.14 | 1.22.14 |
<=1.21.14 | ||
>=1.22.0<1.22.14 | ||
>=1.23.0<1.23.11 | ||
>=1.24.0<1.24.5 | ||
=1.25.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-3172.
The severity of CVE-2022-3172 is medium.
The affected software of CVE-2022-3172 is kube-apiserver.
CVE-2022-3172 affects kube-apiserver by allowing an aggregated API server to redirect client traffic to any URL, leading to potential server-side request forgery (SSRF) attacks.
To fix CVE-2022-3172, you should update kube-apiserver to version 1.25.1 or apply the recommended patches provided by Red Hat.