6.5
CVSSv2

CVE-2019-11247

Published: 29/08/2019 Updated: 02/10/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions before 1.13.9, versions before 1.14.5, versions before 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes kubernetes

kubernetes kubernetes 1.12.11

redhat openshift container platform 3.9

redhat openshift container platform 3.10

redhat openshift container platform 3.11

Vendor Advisories

Debian Bug report logs - #933988 kubernetes: CVE-2019-11247: API server allows access to custom resources via wrong scope Package: src:kubernetes; Maintainer for src:kubernetes is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 5 Aug 2019 19:27:21 UTC Severity: g ...
Synopsis Important: OpenShift Container Platform 310 security update Type/Severity Security Advisory: Important Topic An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 310Red Hat Product Security has rated this update as having a security impact of Important A Comm ...
Synopsis Important: OpenShift Container Platform 39 security update Type/Severity Security Advisory: Important Topic An security update is now available for Red Hat OpenShift Container Platform 39Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Moderate: OpenShift Container Platform 4111 openshift security update Type/Severity Security Advisory: Moderate Topic An update for openshift is now available for Red Hat OpenShift Container Platform 41Red Hat Product Security has rated this update as having a security impact of Moderate A Com ...

Github Repositories

Sample code and files from StackRox blog posts

Example code from StackRox blog posts This repository contains sample code and long-form examples used in posts o wwwstackroxcom Table of Contents code/ opa-gatekeeper-taint-tolerations/ cves/ cve-2019-11247/

Recent Articles

Captain, we've detected a disturbance in space-time. It's coming from Earth. Someone audited the Kubernetes source
The Register • Thomas Claburn in San Francisco • 06 Aug 2019

Lid lifted on container toolkit's two million lines of code, 34 vulnerabilities peer out Container code cluster-fact: There's a hole in Kubernetes that lets miscreants cause havoc

The Cloud Native Computing Foundation (CNCF) today released a security audit of Kubernetes, the widely used container orchestration software, and the findings are about what you'd expect for a project with about two million lines of code: there are plenty of flaws that need to be addressed. The CNCF engaged two security firms, Trail of Bits and Atredis Partners, to poke around Kubernetes code over the course of four months. The companies looked at Kubernetes components involved in networking, cr...