Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Users are advised not to open email messages from suspicious or
unrecognized sources. If users cannot verify that links or attachments
included in email messages are safe, they are advised not to open them.
Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.
Administrators are advised to use an unprivileged account when browsing the Internet.
Administrators are advised to monitor critical systems.
To exploit this vulnerability, the attacker must send a crafted cookie
to the targeted system, making exploitation more difficult in
environments that restrict network access from untrusted sources.