kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.
References
Link | Resource |
---|---|
https://github.com/google/kctf/commit/8cf050be974fcc2fd8aa136701f9a66f2b2a5202 | Patch Third Party Advisory |
https://github.com/google/kctf/pull/371 | Patch Third Party Advisory |
https://github.com/google/kctf/security/advisories/GHSA-4g2v-6qc6-6jv5 | Third Party Advisory |
https://github.com/google/kctf/commit/8cf050be974fcc2fd8aa136701f9a66f2b2a5202 | Patch Third Party Advisory |
https://github.com/google/kctf/pull/371 | Patch Third Party Advisory |
https://github.com/google/kctf/security/advisories/GHSA-4g2v-6qc6-6jv5 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-06-13 16:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-31055
Mitre link : CVE-2022-31055
CVE.ORG link : CVE-2022-31055
JSON object : View
Products Affected
- kctf
CWE