Information Exposure Affecting github.com/kubernetes/kube-state-metrics Open this link in a new tab package, versions >=1.7.0 <1.7.2
Attack Complexity
Low
Confidentiality
High
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMKUBERNETESKUBESTATEMETRICS-471888
-
published
3 Oct 2019
-
disclosed
3 Oct 2019
-
credit
Unknown
Introduced: 3 Oct 2019
CVE-2019-17110 Open this link in a new tabHow to fix?
Upgrade github.com/kubernetes/kube-state-metrics
to version 1.7.2 or higher.
Overview
github.com/kubernetes/kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects.
Affected versions of this package are vulnerable to Information Exposure. An experimental feature that enabled annotations to be exposed as metrics. By default, kube-state-metrics
metrics only expose metadata about Secrets. Default kubectl
behavior and this new feature can cause the entire secret content to end up in metric labels and therefore exposing the secret content in metrics.