3
CVSSv3

CVE-2021-25743

Published: 07/01/2022 Updated: 28/02/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3 | Impact Score: 1.4 | Exploitability Score: 1.3
VMScore: 187
Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N

Vulnerability Summary

An improper input validation vulnerability exists in Kubernetes. In Kubernetes and the OpenShift Container Platform, terminal escape sequence characters are not sanitized in various object-free text fields. This flaw allows an authenticated user to include escape sequence characters in free text fields that are later displayed by the `kubectl` or `oc` binaries. This issue allows spoofing and obscuring `kubectl` output.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kubernetes kubernetes

Vendor Advisories

Debian Bug report logs - #1016441 kubernetes: CVE-2021-25743 Package: src:kubernetes; Maintainer for src:kubernetes is Janos Lenart <ocsi@debianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 31 Jul 2022 19:27:02 UTC Severity: important Tags: security, upstream Reply or subscribe to this bug ...
An improper input validation vulnerability was discovered in Kubernetes In Kubernetes and the OpenShift Container Platform, terminal escape sequence characters are not sanitized in various object-free text fields This flaw allows an authenticated user to include escape sequence characters in free text fields that are later displayed by the `kubec ...