Information Exposure Affecting github.com/kubernetes/kube-state-metrics Open this link in a new tab package, versions >=1.7.0 <1.7.2


0.0
high
  • Attack Complexity

    Low

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMKUBERNETESKUBESTATEMETRICS-471888

  • published

    3 Oct 2019

  • disclosed

    3 Oct 2019

  • credit

    Unknown

How to fix?

Upgrade github.com/kubernetes/kube-state-metrics to version 1.7.2 or higher.

Overview

github.com/kubernetes/kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects.

Affected versions of this package are vulnerable to Information Exposure. An experimental feature that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. Default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels and therefore exposing the secret content in metrics.