Improper Restriction of Excessive Authentication Attempts Affecting github.com/edgelesssys/constellation/v2/internal/constellation/helm package, versions <2.16.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMEDGELESSSYSCONSTELLATIONV2INTERNALCONSTELLATIONHELM-6615866
  • published 16 Apr 2024
  • disclosed 15 Apr 2024
  • credit Feroz Salam

Introduced: 15 Apr 2024

CVE NOT AVAILABLE CWE-940 Open this link in a new tab

How to fix?

Upgrade github.com/edgelesssys/constellation/v2/internal/constellation/helm to version 2.16.3 or higher.

Overview

Affected versions of this package are vulnerable to Improper Restriction of Excessive Authentication Attempts due to the way pods are exposed to peers in a Virtual Private Cloud (VPC). An attacker within the cloud VPC can access pods directly using their internal pod IP address, even if these pods are not explicitly exposed (e.g., via LoadBalancer). This vulnerability arises when a pod does not authenticate clients and does not exclude world traffic through network policies, potentially leading to sensitive data leakage.

Workaround

This vulnerability can be mitigated by applying a network policy that excludes all world traffic. However, this will also block all desired external traffic. For known vulnerable pods, a specific policy can be crafted to firewall those selectively.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None