Information Exposure Affecting github.com/kubernetes/kube-state-metrics package, versions >=1.7.0 <1.7.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.51% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMKUBERNETESKUBESTATEMETRICS-471888
  • published3 Oct 2019
  • disclosed3 Oct 2019
  • creditUnknown

Introduced: 3 Oct 2019

CVE-2019-10223  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/kubernetes/kube-state-metrics to version 1.7.2 or higher.

Overview

github.com/kubernetes/kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects.

Affected versions of this package are vulnerable to Information Exposure. An experimental feature that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. Default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels and therefore exposing the secret content in metrics.

Note: CVE-2019-10223 is a duplicate of CVE-2019-17110.

CVSS Base Scores

version 3.1