CVE-2016-1905

Published on: 02/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

Certain versions of Kubernetes from Kubernetes contain the following vulnerability:

The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.

  • CVE-2016-1905 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.7 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED NONE HIGH NONE

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
api server: patch operation should use patched object to check admission control · Issue #19479 · kubernetes/kubernetes · GitHub github.com
text/html
URL Logo CONFIRM github.com/kubernetes/kubernetes/issues/19479
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:0070

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationKubernetesKubernetes-AllAllAll
ApplicationKubernetesKubernetes-AllAllAll
  • cpe:2.3:a:kubernetes:kubernetes:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:kubernetes:kubernetes:-:*:*:*:*:*:*:*: