QID 375921
Date Published: 2021-10-06
QID 375921: Kubernetes Improper Authorization Vulnerability
Kubernetes is an open-source container-orchestration system for automating deployment, scaling and management of containerized applications.
Affected version:
Kubernetes versions v1.22.0 - v1.22.1
Kubernetes versions v1.21.0 - v1.21.4
Kubernetes versions v1.20.0 - v1.20.10
Kubernetes versions prior to and including v1.19.14
QID Detection Logic:(Authenticated)
The QID uses 'kubectl version' command to check for vulnerable versions of Kubernetes and also checks if 'kube-apiserver' is running or not.
QID Detection Logic:(Unauthenticated)
The detection uses the response from requests HTTP GET /openapi/v2 and HTTP GET /version to check for the version of Kubernetes.
Successful exploitation of the vulnerability may allow an attacker to create a container with subpath volume mounts to access files and directories outside of the volume, including on the host filesystem.
Workaround:
To mitigate this vulnerability without upgrading kubelet, you can disable the VolumeSubpath feature gate on kubelet and kube-apiserver, and remove any existing Pods making use of the feature.
You can also use admission control to prevent less-trusted users from running containers as root to reduce the impact of successful exploitation.
- CVE-2021-25741 -
groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s
CVEs related to QID 375921
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| NA |
|