Access Restriction Bypass Affecting github.com/kubernetes/kubernetes/staging/src/k8s.io/apiserver/pkg/storage/etcd package, versions <1.22.16>=1.23.0 <1.23.14>=1.24.0 <1.24.8>=1.25.0 <1.25.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMKUBERNETESKUBERNETESSTAGINGSRCK8SIOAPISERVERPKGSTORAGEETCD-3112359
  • published11 Nov 2022
  • disclosed10 Nov 2022
  • creditKubernetes Security Response Committee

Introduced: 10 Nov 2022

CVE-2022-3162  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade github.com/kubernetes/kubernetes/staging/src/k8s.io/apiserver/pkg/storage/etcd to version 1.22.16, 1.23.14, 1.24.8, 1.25.4 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass such that users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different kind in the same API group they are not authorized to read.

CVSS Scores

version 4.0
version 3.1