Execution with Unnecessary Privileges Affecting github.com/openkruise/kruise/apis/apps/defaults/ package, versions >=0.8.0 <1.5.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENKRUISEKRUISEAPISAPPSDEFAULTS-6144087
  • published4 Jan 2024
  • disclosed3 Jan 2024
  • creditUnknown

Introduced: 3 Jan 2024

CVE-2023-30617  (opens in a new tab)
CWE-250  (opens in a new tab)

How to fix?

Upgrade github.com/openkruise/kruise/apis/apps/defaults/ to version 1.5.2 or higher.

Overview

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges via the kruise-daemon pod, an attacker with root privilege on the node can list all secrets in the cluster. Utilizing these secrets, such as the kruise-manager service account token, the attacker can escalate privileges and modify pods. This is only exploitable if the attacker has gained root privilege of the node where kruise-daemon runs.

Workaround

This vulnerability can be mitigated by modifying kruise-daemon-role to remove the cluster level secret get/list privilege, for users not requiring imagepulljob functions.

References

CVSS Base Scores

version 3.1