Incorrect Authorization Affecting github.com/fluid-cloudnative/fluid/cmd/csi/app package, versions >=0.7.0 <0.8.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMFLUIDCLOUDNATIVEFLUIDCMDCSIAPP-5500166
  • published9 May 2023
  • disclosed9 May 2023
  • creditNanzi Yang

Introduced: 9 May 2023

CVE-2023-30840  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade github.com/fluid-cloudnative/fluid/cmd/csi/app to version 0.8.6 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization such that if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the csi-nodeplugin-fluid node-daemonset), he/she can leverage the fluid-csi service account to modify specs of all the nodes in the cluster.

Note: Since this service account lacks list node permissions, the attacker may need to use other techniques to identify vulnerable nodes.

Workaround

Users who are unable to upgrade to the fixed version can delete the csi-nodeplugin-fluid daemonset in fluid-system namespace and avoid using CSI mode to mount FUSE file systems. Alternatively using sidecar mode to mount FUSE file systems is recommended. Refer to (the doc)[https://github.com/fluid-cloudnative/fluid/blob/master/docs/en/samples/knative.md] to get a full example of how to use sidecar mode.

CVSS Scores

version 3.1