Impact: Low Public Date: 2019-04-22 CWE: CWE-200 Bugzilla: 1703218: CVE-2019-11243 kubernetes: Authentication information exposure in rest.AnonymousClientConfig() In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2019-11243 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 3.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | None |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat OpenShift Container Platform 3.9 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.7 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.6 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.5 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.4 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.11 | atomic-openshift | Under investigation |
Red Hat OpenShift Container Platform 3.10 | atomic-openshift | Under investigation |
Red Hat Gluster Storage 3 | heketi | Under investigation |
Red Hat Enterprise Linux 7 | containernetworking-plugins | Under investigation |