Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-08-20 21:15
Updated : 2024-08-21 12:30
NVD link : CVE-2024-42363
Mitre link : CVE-2024-42363
CVE.ORG link : CVE-2024-42363
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data