CVE-2023-1065
Summary
| CVE | CVE-2023-1065 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-02-28 19:15:00 UTC |
| Updated | 2023-03-10 04:58:00 UTC |
| Description | This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case). |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Snyk | Kubernetes Monitor | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| RELEASE V2 by kat1906 · Pull Request #1275 · snyk/kubernetes-monitor · GitHub | MISC | github.com | |
| GitHub - snyk/kubernetes-monitor: Use Snyk to find and fix vulnerabilities in your Kubernetes workloads | MISC | github.com | |
| feat: call authenticated snyk API endpoints with token · snyk/kubernetes-monitor@5b9a782 · GitHub | MISC | github.com | |
| 403 Forbidden | MISC | snyk.io | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.