{"api_version":"1","generated_at":"2026-04-23T02:36:10+00:00","cve":"CVE-2018-1002103","urls":{"html":"https://cve.report/CVE-2018-1002103","api":"https://cve.report/api/cve/CVE-2018-1002103.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1002103","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1002103"},"summary":{"title":"CVE-2018-1002103","description":"In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.","state":"PUBLIC","assigner":"jordan@liggitt.net","published_at":"2018-12-05 21:29:00","updated_at":"2019-10-09 23:32:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://github.com/kubernetes/minikube/issues/3208","name":"https://github.com/kubernetes/minikube/issues/3208","refsource":"CONFIRM","tags":["Issue Tracking","Mitigation","Third Party Advisory"],"title":"CVE-2018-1002103: Dashboard vulnerable to DNS rebinding attack · Issue #3208 · kubernetes/minikube · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1002103","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1002103","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1002103","vulnerable":"1","versionEndIncluding":"0.29.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kubernetes","cpe5":"minikube","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"jordan@liggitt.net","DATE_ASSIGNED":"2018-10-03","ID":"CVE-2018-1002103","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Minikube","version":{"version_data":[{"version_affected":">=","version_value":"v0.3.0"},{"version_affected":"<","version_value":"v0.30.0"}]}}]},"vendor_name":"Kubernetes"}]}},"credit":["Reported by Alex Kaskasoli"],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://github.com/kubernetes/minikube/issues/3208","refsource":"CONFIRM","url":"https://github.com/kubernetes/minikube/issues/3208"}]}},"nvd":{"publishedDate":"2018-12-05 21:29:00","lastModifiedDate":"2019-10-09 23:32:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kubernetes:minikube:*:*:*:*:*:*:*:*","versionStartIncluding":"0.3.0","versionEndIncluding":"0.29.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1002103","Ordinal":"138301","Title":"CVE-2018-1002103","CVE":"CVE-2018-1002103","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1002103","Ordinal":"1","NoteData":"In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1002103","Ordinal":"2","NoteData":"2018-12-05","Type":"Other","Title":"Published"}]}}}