Information Exposure Affecting github.com/kyverno/kyverno package, versions <1.10.5


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMKYVERNOKYVERNO-6057583
  • published15 Nov 2023
  • disclosed14 Nov 2023
  • creditAdamKorcz

Introduced: 14 Nov 2023

CVE-2023-47630  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/kyverno/kyverno to version 1.10.5 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure when the digest of images is manipulated. An attacker can cause a user to unintentionally consume an insecure image by compromising the registry from which the images are fetched.

Note:

This is only exploitable if the attacker knows which images the user consumes and is aware of exploitable vulnerabilities in previous digests of the images. Alternatively, the attacker could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. This vulnerability does not allow the attacker to control other parameters of the image other than the digest.

Users pulling their images from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild.

CVSS Base Scores

version 3.1