Access Restriction Bypass Affecting k8s.io/apiserver/pkg/storage/etcd package, versions <0.22.16 >=0.23.0 <0.23.14 >=0.24.0 <0.24.8 >=0.25.0 <0.25.4 >=1.7.6 <1.22.16 >=1.23.0 <1.23.14 >=1.24.0 <1.24.8 >=1.25.0 <1.25.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-K8SIOAPISERVERPKGSTORAGEETCD-8145192
  • published 2 Oct 2024
  • disclosed 10 Nov 2022
  • credit Kubernetes Security Response Committee

How to fix?

Upgrade k8s.io/apiserver/pkg/storage/etcd to version 0.22.16, 0.23.14, 0.24.8, 0.25.4, 1.22.16, 1.23.14, 1.24.8, 1.25.4 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass such that users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different kind in the same API group they are not authorized to read.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
7.1 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None