CVE-2022-45933

KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
References
Link Resource
https://github.com/benc-uk/kubeview/issues/95 Exploit Issue Tracking Third Party Advisory
https://github.com/benc-uk/kubeview/issues/95 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-11-27 03:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45933

Mitre link : CVE-2022-45933

CVE.ORG link : CVE-2022-45933


JSON object : View

Products Affected

kubeview_project

  • kubeview
CWE
CWE-306

Missing Authentication for Critical Function