First published: Tue Aug 13 2019(Updated: )
Kubernetes requires an authentication mechanism to enforce users’ privileges. One method of authentication, bearer tokens, are opaque strings used to associate a user with their having successfully authenticated previously. Any user with possession of this token may masquerade as the original user (the “bearer”) without further authentication. Within Kubernetes, the bearer token is captured within the hyperkube kube-apiserver system logs at high verbosity levels (--v 10). A malicious user with access to the system logs on such a system could masquerade as any user who has previously logged into the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes API Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1740434 is considered high due to the risk of unauthorized access using bearer tokens.
To fix REDHAT-BUG-1740434, ensure that bearer tokens are properly managed and implement additional security controls such as short token lifetimes.
REDHAT-BUG-1740434 compromises Kubernetes security by allowing unauthorized users to impersonate legitimate users if they gain access to bearer tokens.
Yes, REDHAT-BUG-1740434 affects specific versions of the Kubernetes kube-apiserver that utilize bearer token authentication.
You can monitor for exploitation of REDHAT-BUG-1740434 by tracking suspicious activity and unauthorized access attempts related to bearer token usage.