First published: Sat Jan 14 2023(Updated: )
KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Kubeoperator | <3.16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22480 is a vulnerability in KubeOperator versions 3.16.3 and below, where API interfaces with unauthorized entities and can leak sensitive information.
The severity of CVE-2023-22480 is critical with a CVSS score of 9.8.
CVE-2023-22480 affects KubeOperator versions 3.16.3 and below, allowing unauthorized entities to access API interfaces and potentially leak sensitive information.
To fix CVE-2023-22480, update KubeOperator to version 3.16.4 or above.
The references for CVE-2023-22480 are: [GitHub Commit](https://github.com/KubeOperator/KubeOperator/commit/7ef42bf1c16900d13e6376f8be5ecdbfdfb44aaf), [Release](https://github.com/KubeOperator/KubeOperator/releases/tag/v3.16.4), [Advisory](https://github.com/KubeOperator/KubeOperator/security/advisories/GHSA-jxgp-jgh3-8jc8).